1 HP-ICF-GENERIC-RPTR DEFINITIONS ::= BEGIN 2 3 IMPORTS 4 Integer32, 5 OBJECT-TYPE, MODULE-IDENTITY, NOTIFICATION-TYPE 6 FROM SNMPv2-SMI 7 MacAddress, DisplayString, RowStatus, TimeStamp 8 FROM SNMPv2-TC 9 MODULE-COMPLIANCE, OBJECT-GROUP, NOTIFICATION-GROUP 10 FROM SNMPv2-CONF 11 hpicfObjectModules, hpicfGenericRepeater, icfHub, 12 hpicfGenRptrTrapsPrefix 13 FROM HP-ICF-OID; 14 15 hpicfGenRptrMib MODULE-IDENTITY 16 LAST-UPDATED "200306092237Z" -- June 9, 2003 17 ORGANIZATION "Hewlett Packard Company, 18 Network Infrastructure Solutions" 19 CONTACT-INFO 20 "Hewlett Packard Company 21 8000 Foothills Blvd. 22 Roseville, CA 95747" 23 DESCRIPTION 24 "This MIB module contains object definitions that 25 are common to all repeater devices in the HP 26 Integrated Communication Facility product 27 line." 28 29 REVISION "200306092237Z" -- June 9, 2003 30 DESCRIPTION "Added learnLimitedContinuous mode to 31 hpSecPtLearnMode." 32 33 REVISION "200011030717Z" -- November 3, 2000 34 DESCRIPTION "Deprecate hpSecPtPreventEavesdrop. Update 35 division name." 36 37 REVISION "9807230103Z" -- July 23, 1998 38 DESCRIPTION 39 "Added the hpicfGenRptrBridgeGroup. Updated 40 compliances." 41 REVISION "9703060337Z" -- March 6, 1997 42 DESCRIPTION 43 "Added the hpicfGenRptrSwitchConfigGroup. Added 44 NOTIFICATION-GROUP information." 45 REVISION "9609100228Z" -- September 10, 1996 46 DESCRIPTION 47 "Split this MIB module from the former monolithic 48 hp-icf MIB. Added the hpicfGenRptrInfoGroup, the 49 hpicfGenRptrBkpLinkGroup, and the 50 hpicfGenRptrPortMappingGroup." 51 REVISION "9510232347Z" -- October 23, 1995 52 DESCRIPTION 53 "Version of MIB module that added support for 54 the HPJ2413A and HPJ2415A 100VG hubs, and the 55 HPJ2414B agent module. Added the 56 hpicfGenRptrSecPtGroup." 57 REVISION "9501180000Z" -- January 18, 1995 58 DESCRIPTION 59 "Version of MIB module that added support for 60 the HPJ2410A 100VG repeater and the HPJ2414A 61 agent module. Added the hpicfGenRptrBasicGroup." 62 REVISION "9307090000Z" -- July 9, 1993 63 DESCRIPTION 64 "Initial version of this MIB module. Released 65 with the HPJ2355A hub." 66 ::= { hpicfObjectModules 8 } 67 68 69 hpGRpBasic 70 OBJECT IDENTIFIER ::= { hpicfGenericRepeater 1 } 71 72 hpGRpBasicGlobal 73 OBJECT IDENTIFIER ::= { hpGRpBasic 1 } 74 75 hpGRpSelfHealEnable OBJECT-TYPE 76 SYNTAX INTEGER { 77 enabled(1), 78 disabled(2) 79 } 80 MAX-ACCESS read-write 81 STATUS current 82 DESCRIPTION 83 "This flag controls whether or not the device will 84 send self healing packets. Self healing packets are 85 normally sent once per second by the agent when no 86 other traffic is present. When there is no traffic 87 present on a network, there is no way to detect 88 cabling problems (or the repair of cabling problems) 89 and status LEDs are not always correct. 90 91 Enabling this flag allows the agent to detect cabling 92 problems on an idle network. This flag can be 93 disabled if self healing packets are not wanted. 94 95 On the 100BaseVG-AnyLAN SNMP/Bridge card, these 96 packets are addressed to a unique unused unicast 97 station address which has been reserved by HP for 98 this purpose. On 802.3 repeaters, these packets are 99 self addressed. 100 101 On an 802.3 repeater, this flag MUST be enabled when 102 using the Robust Port Healing feature. Without 103 Robust Port Healing either a good transmit or a good 104 receive will reconnect an autopartitioned port. With 105 Robust Port Healing the criteria is more restrictive 106 and only a good transmit will heal a segmented port. 107 If all ports are segmented, the repeater will not 108 repeat anything until the agent transmits a self 109 healing packet and reconnects the autopartitioned 110 ports." 111 ::= { hpGRpBasicGlobal 1 } 112 113 114 hpGRpRepeaterTable OBJECT-TYPE 115 SYNTAX SEQUENCE OF HpGRpRepeaterEntry 116 MAX-ACCESS not-accessible 117 STATUS current 118 DESCRIPTION 119 "A table containing generic information about the 120 current logical repeaters in this managed system." 121 ::= { hpGRpBasicGlobal 2 } 122 123 hpGRpRepeaterEntry OBJECT-TYPE 124 SYNTAX HpGRpRepeaterEntry 125 MAX-ACCESS not-accessible 126 STATUS current 127 DESCRIPTION 128 "An entry in the table, containing information about 129 a single logical repeater." 130 INDEX { hpGRpRepeaterIndex } 131 ::= { hpGRpRepeaterTable 1 } 132 133 HpGRpRepeaterEntry ::= 134 SEQUENCE { 135 hpGRpRepeaterIndex Integer32, 136 hpGRpRepeaterIfIndex Integer32, 137 hpGRpRepeaterName DisplayString, 138 hpGRpRepeaterVlanIndex Integer32 139 } 140 141 hpGRpRepeaterIndex OBJECT-TYPE 142 SYNTAX Integer32 (1..2147483647) 143 MAX-ACCESS not-accessible 144 STATUS current 145 DESCRIPTION 146 "This object uniquely identifies the logical repeater 147 in the managed system for which this entry contains 148 information. This object will have the same value 149 as the corresponding 'repeater index' object in the 150 media-specific repeater MIB for this repeater. Note 151 that it will also have the same value as the 152 instance of the Entity MIB's entLogicalIndex for 153 the entry in the entLogicalTable that represents 154 this repeater." 155 ::= { hpGRpRepeaterEntry 1 } 156 157 hpGRpRepeaterIfIndex OBJECT-TYPE 158 SYNTAX Integer32 (0..2147483647) 159 MAX-ACCESS read-only 160 STATUS current 161 DESCRIPTION 162 "The interface on the agent that is used to transmit 163 and receive packets through this repeater. The 164 ifEntry identified by this value is the same entry 165 identified by the same value of the ifIndex object. 166 The value zero indicates that the agent has no 167 interface through which it can send and receive 168 packets on this repeater." 169 ::= { hpGRpRepeaterEntry 2 } 170 171 hpGRpRepeaterName OBJECT-TYPE 172 SYNTAX DisplayString (SIZE(0..16)) 173 MAX-ACCESS read-write 174 STATUS current 175 DESCRIPTION 176 "A friendly name for this repeater. Management 177 applications can use this to configure a user 178 friendly name for this logical repeater." 179 ::= { hpGRpRepeaterEntry 3 } 180 181 hpGRpRepeaterVlanIndex OBJECT-TYPE 182 SYNTAX Integer32 (0..65535) 183 MAX-ACCESS read-write 184 STATUS current 185 DESCRIPTION 186 "The virtual LAN that this repeater is on. Note that 187 setting this object does not affect the operation of 188 the repeater in any way. It is a 'notepad' for 189 management applications to allow them to record 190 which VLAN on a connected switch this logical 191 repeater is connected to." 192 ::= { hpGRpRepeaterEntry 4 } 193 194 195 -- The Generic Repeater Security group. 196 197 hubSecurity OBJECT IDENTIFIER ::= { icfHub 10 } 198 199 hubSecurePortTable OBJECT-TYPE 200 SYNTAX SEQUENCE OF HubSecurePortEntry 201 MAX-ACCESS not-accessible 202 STATUS current 203 DESCRIPTION 204 "Table containing security configuration for each 205 port." 206 ::= { hubSecurity 1 } 207 208 hubSecurePortEntry OBJECT-TYPE 209 SYNTAX HubSecurePortEntry 210 MAX-ACCESS not-accessible 211 STATUS current 212 DESCRIPTION 213 "An entry in the hubSecurePortTable, containing 214 the security configuration for a single port." 215 INDEX { hubSecPtGroupIndex, hubSecPtPortIndex } 216 ::= { hubSecurePortTable 1 } 217 218 HubSecurePortEntry ::= 219 SEQUENCE { 220 hubSecPtGroupIndex Integer32, 221 hubSecPtPortIndex Integer32, 222 hubSecPtSecurityAddress MacAddress, 223 hubSecPtAuthorizedAddress MacAddress, 224 hubSecPtPreventEavesdrop INTEGER, 225 hubSecPtAlarmEnable INTEGER, 226 hubSecPtIntrusionFlag INTEGER 227 } 228 229 hubSecPtGroupIndex OBJECT-TYPE 230 SYNTAX Integer32 (1..2147483647) 231 MAX-ACCESS read-only 232 STATUS current 233 DESCRIPTION 234 "This object identifies the group containing the 235 port for which this entry contains security 236 configuration information." 237 ::= { hubSecurePortEntry 1 } 238 239 hubSecPtPortIndex OBJECT-TYPE 240 SYNTAX Integer32 (1..2147483647) 241 MAX-ACCESS read-only 242 STATUS current 243 DESCRIPTION 244 "This object identifies the port within the group 245 for which this entry contains security 246 configuration information." 247 ::= { hubSecurePortEntry 2 } 248 249 hubSecPtSecurityAddress OBJECT-TYPE 250 SYNTAX MacAddress 251 MAX-ACCESS read-write 252 STATUS current 253 DESCRIPTION 254 "The desired authorized MAC address for this port. 255 This can be either a regular station address to 256 configure a specific address, or it can be one of 257 the following special values to specify the 258 address learning method: 259 FFFF-FFFF-FFFE: learnOnce. First source MAC 260 address heard on this port becomes the 261 authorized address. Setting this value 262 initiates learning of a new authorized 263 address. When a new authorized address is 264 learned, it will be stored in nonvolatile 265 memory. This variable will return 266 learnOnceConditionally to a GET operation 267 after it has been set to this value. 268 FFFF-FFFF-FFFD: learnOnceConditionally. This 269 option will initiate learning of a new 270 authorized address only if the previous 271 hubSecPtSecurityAddress was set to a 272 specific address or learnContinuous. No 273 action will be performed if the previous 274 value was already learnOnceConditionally. 275 FFFF-FFFF-FFFC: learnContinuous. Any address 276 heard becomes the new authorized address. 277 When a new address is learned, it may 278 cause an alarm, but it does not store 279 anything in nonvolatile memory." 280 ::= { hubSecurePortEntry 3 } 281 282 hubSecPtAuthorizedAddress OBJECT-TYPE 283 SYNTAX MacAddress 284 MAX-ACCESS read-only 285 STATUS current 286 DESCRIPTION 287 "The MAC address of the station authorized to be 288 on this port. This address could either have been 289 configured by specifying a regular station address 290 for hubSecPtSecurityAddress, or it could have been 291 learned by the agent if hubSecPtSecurityAddress 292 was set to one of the special values listed above. 293 Once the agent has learned an authorized address, 294 it will be saved across powerfails, unless the 295 agent was configured for learnContinuous mode." 296 ::= { hubSecurePortEntry 4 } 297 298 hubSecPtPreventEavesdrop OBJECT-TYPE 299 SYNTAX INTEGER { 300 enable(1), 301 disable(2) 302 } 303 MAX-ACCESS read-write 304 STATUS current 305 DESCRIPTION 306 "If enabled, unicast packets not addressed to the 307 authorized address for this port will be 308 scrambled." 309 ::= { hubSecurePortEntry 5 } 310 311 hubSecPtAlarmEnable OBJECT-TYPE 312 SYNTAX INTEGER { 313 enable(1), 314 disable(2) 315 } 316 MAX-ACCESS read-write 317 STATUS current 318 DESCRIPTION 319 "If enabled, the agent will generate an 320 intrusionTrap if a packet is received on this port 321 with a source MAC address that is different from 322 the hubSecPtAuthorizedAddress for this port." 323 ::= { hubSecurePortEntry 6 } 324 325 hubSecPtIntrusionFlag OBJECT-TYPE 326 SYNTAX INTEGER { 327 intrusion(1), 328 noIntrusion(2) 329 } 330 MAX-ACCESS read-write 331 STATUS current 332 DESCRIPTION 333 "This flag indicates if an intrusion has occurred 334 on this port. The Security LED on the hub will 335 blink if any instance of this flag has the value 336 intrusion. Setting this flag to noIntrusion will 337 turn off the Security LED if no other ports have 338 this flag set to intrusion. An intrusion will 339 only cause an alarm and an intrusion log entry if 340 this flag is equal to noIntrusion." 341 ::= { hubSecurePortEntry 7 } 342 343 hubIntruderLogTable OBJECT-TYPE 344 SYNTAX SEQUENCE OF HubIntruderLogEntry 345 MAX-ACCESS not-accessible 346 STATUS current 347 DESCRIPTION 348 "This table contains a record of the twenty most 349 recent port security violations. The first entry 350 in the table is the oldest." 351 ::= { hubSecurity 2 } 352 353 hubIntruderLogEntry OBJECT-TYPE 354 SYNTAX HubIntruderLogEntry 355 MAX-ACCESS not-accessible 356 STATUS current 357 DESCRIPTION 358 "A row in the hubIntruderLogTable containing 359 information about a single port security 360 violation." 361 INDEX { hubIntruderIndex } 362 ::= { hubIntruderLogTable 1 } 363 364 HubIntruderLogEntry ::= 365 SEQUENCE { 366 hubIntruderIndex Integer32, 367 hubIntruderGroup Integer32, 368 hubIntruderPort Integer32, 369 hubIntruderAddress MacAddress, 370 hubIntruderTime TimeStamp, 371 hubIntruderType INTEGER, 372 hubIntruderTrainingViolation INTEGER 373 } 374 375 hubIntruderIndex OBJECT-TYPE 376 SYNTAX Integer32 (1..20) 377 MAX-ACCESS read-only 378 STATUS current 379 DESCRIPTION 380 "The index of this entry in the intruder log 381 table. Index 1 will always contain the oldest 382 entry. If the table is full when a new intrusion 383 occurs, the new entry becomes index 20, and all 384 earlier entries are shifted down by one entry, 385 removing the old index 1." 386 ::= { hubIntruderLogEntry 1 } 387 388 hubIntruderGroup OBJECT-TYPE 389 SYNTAX Integer32 (0..2147483647) 390 MAX-ACCESS read-only 391 STATUS current 392 DESCRIPTION 393 "This object identifies the group containing the 394 port on which this intrusion occurred." 395 ::= { hubIntruderLogEntry 2 } 396 397 hubIntruderPort OBJECT-TYPE 398 SYNTAX Integer32 (0..2147483647) 399 MAX-ACCESS read-only 400 STATUS current 401 DESCRIPTION 402 "This object identifies the port within the group 403 on which this intrusion occurred. A port number 404 of zero indicates that this entry is unused and 405 the values for the other variables in this entry 406 are undefined." 407 ::= { hubIntruderLogEntry 3 } 408 409 hubIntruderAddress OBJECT-TYPE 410 SYNTAX MacAddress 411 MAX-ACCESS read-only 412 STATUS current 413 DESCRIPTION 414 "This object contains the source MAC address of 415 the intruder." 416 ::= { hubIntruderLogEntry 4 } 417 418 hubIntruderTime OBJECT-TYPE 419 SYNTAX TimeStamp 420 MAX-ACCESS read-only 421 STATUS current 422 DESCRIPTION 423 "The value of sysUpTime when the intrusion 424 occurred. This will be zero if the agent has been 425 reset since the intruder was detected, since 426 sysUpTime could be misinterpreted in that case." 427 ::= { hubIntruderLogEntry 5 } 428 429 hubIntruderType OBJECT-TYPE 430 SYNTAX INTEGER { 431 address(1), 432 training(2), 433 both(3), 434 none(4) 435 } 436 MAX-ACCESS read-only 437 STATUS current 438 DESCRIPTION 439 "This object identifies the type of violation that 440 occured: address, training, or both. The 441 hubIntruderTrainingViolation object will indicate 442 additional information, if any, on the type of 443 training violation. This object will be equal to 444 'none' if this log entry is unused. Note that 445 the values 'training' and 'both' are only valid 446 for 802.12 ports." 447 ::= { hubIntruderLogEntry 6 } 448 449 hubIntruderTrainingViolation OBJECT-TYPE 450 SYNTAX INTEGER { 451 noViolation(1), 452 promiscuousViolation(2), 453 repeaterViolation(3) 454 } 455 MAX-ACCESS read-only 456 STATUS current 457 DESCRIPTION 458 "This object indicates the type of training 459 violation. Note that for 802.3 ports, 460 this object will always be equal to 'noViolation'. 461 This object will be equal to 'noViolation' if this 462 log entry is unused." 463 ::= { hubIntruderLogEntry 7 } 464 465 466 hpSecurePortTable OBJECT-TYPE 467 SYNTAX SEQUENCE OF HpSecurePortEntry 468 MAX-ACCESS not-accessible 469 STATUS current 470 DESCRIPTION 471 "Table containing security configuration 472 for each port, where security for multiple 473 MAC addresses per port is desired (e.g., 474 switch systems)." 475 ::= { hubSecurity 3 } 476 477 hpSecurePortEntry OBJECT-TYPE 478 SYNTAX HpSecurePortEntry 479 MAX-ACCESS not-accessible 480 STATUS current 481 DESCRIPTION 482 "An entry in the hpSecurePortTable, containing 483 the security configuration for a single port." 484 INDEX { hpSecPtGroupIndex, hpSecPtPortIndex } 485 ::= { hpSecurePortTable 1 } 486 487 HpSecurePortEntry ::= 488 SEQUENCE { 489 hpSecPtGroupIndex Integer32, 490 hpSecPtPortIndex Integer32, 491 hpSecPtAddressLimit Integer32, 492 hpSecPtLearnMode INTEGER, 493 hpSecPtPreventEavesdrop INTEGER, 494 hpSecPtAlarmEnable INTEGER, 495 hpSecPtIntrusionFlag INTEGER 496 } 497 498 hpSecPtGroupIndex OBJECT-TYPE 499 SYNTAX Integer32 (1..2147483647) 500 MAX-ACCESS not-accessible 501 STATUS current 502 DESCRIPTION 503 "This object identifies the group containing the 504 port for which this entry contains security 505 configuration information. On repeater systems, 506 this can be used to identify a specific repeater 507 within a managed stack of repeaters. On switch 508 systems, stacked or unstacked, this value is 509 always one." 510 ::= { hpSecurePortEntry 1 } 511 512 hpSecPtPortIndex OBJECT-TYPE 513 SYNTAX Integer32 (1..2147483647) 514 MAX-ACCESS not-accessible 515 STATUS current 516 DESCRIPTION 517 "This object identifies the port within the group 518 for which this entry contains security 519 configuration information. On a switch system, 520 this index corresponds to the ifIndex of the port." 521 ::= { hpSecurePortEntry 2 } 522 523 hpSecPtAddressLimit OBJECT-TYPE 524 SYNTAX Integer32 (1..32) 525 MAX-ACCESS read-write 526 STATUS current 527 DESCRIPTION 528 "This object identifies the maximum number of 529 MAC addresses learned on this port when the 530 hpSecPtLearnMode is set to learnFirstN or 531 learnFirstNConditionally. Changing the limit 532 while in these modes clears any addresses for 533 this port in the hpSecureAuthAddrTable. 534 This limit does not apply when the learn mode 535 is set to configureSpecific." 536 ::= { hpSecurePortEntry 3 } 537 538 hpSecPtLearnMode OBJECT-TYPE 539 SYNTAX INTEGER { 540 learnContinuous(1), 541 learnFirstN(2), 542 learnFirstNConditionally(3), 543 configureSpecific(4), 544 learn8021xAuthorized(5), 545 learnLimitedContinuous(6) 546 } 547 MAX-ACCESS read-write 548 STATUS current 549 DESCRIPTION 550 "This object identifies the learning mode of the port. 551 The modes are as follows: 552 LearnContinuous. The port can learn all new MAC 553 addresses. When a new address is learned, 554 it is stored in a manner such that it can 555 be retrieved from the hpSecureAuthAddrTable. 556 Changing the mode to this value clears any 557 existing addresses for this port in the 558 hpSecureAuthAddrTable. 559 learnFirstN. First N source MAC addresses heard 560 on this port become the authorized addresses. 561 N is configured in hpSecPtAddressLimit. 562 Setting this value initiates learning of up 563 to N new authorized addresses. When a new 564 authorized address is learned, it will be 565 stored in the hpSecureAuthAddrTable. When 566 the table has reached its limit N for this 567 port, any new source MAC addresses received 568 on the port constitutes an intrusion. See 569 hpSecPtAlarmEnable for possible responses 570 to the intrusion. This variable will return 571 learnFirstNConditionally to a GET operation 572 after it has been set to this value. 573 learnFirstNConditionally. This option will 574 initiate learning of up to N new authorized 575 addresses only if the previous hpSecPtLearnMode 576 was not set to learnFirstN or learnFirstN- 577 Conditionally. N is configured in 578 hpSecPtAddressLimit. 579 configureSpecific. The port will not learn any 580 addresses. Rather, specific authorized 581 MAC addresses for this port are explicitly 582 configured via the hpSecureCfgAddrTable. 583 These addresses are also stored in the 584 hpSecureAuthAddrTable. Any source MAC 585 address received on this port other than 586 those configured, constitutes an intrusion. 587 See hpSecPtAlarmEnable for possible responses. 588 learn8021xAuthorized. The port will learn only MAC 589 address of a client authorized by 802.1X 590 authenticator. 591 learnLimitedContinuous. First N source MAC addresses 592 heard on this port become the authorized addresses. 593 N is specified by the hpSecPtAddressLimit 594 object. When a new authorized address is learned, it 595 will be stored in the hpSecureAuthAddrTable. When 596 the table has reached its limit N for this port, any 597 new source MAC addresses received on the port 598 constitutes an intrusion. See hpSecPtAlarmEnable 599 for possible responses. The authorized addresses in 600 this mode will age out of the system, therefore the 601 list of authorized addresses can be dynamic over 602 time." 603 ::= { hpSecurePortEntry 4 } 604 605 hpSecPtPreventEavesdrop OBJECT-TYPE 606 SYNTAX INTEGER { 607 enable(1), 608 disable(2) 609 } 610 MAX-ACCESS read-write 611 STATUS deprecated 612 DESCRIPTION 613 "If enabled on a switch, outbound unknown unicast 614 packets will not be forwarded out this port. If 615 enabled on a repeater, outbound unknown unicast 616 packets for this port will be scrambled." 617 ::= { hpSecurePortEntry 5 } 618 619 hpSecPtAlarmEnable OBJECT-TYPE 620 SYNTAX INTEGER { 621 disable(1), 622 sendTrap(2), 623 sendTrapAndDisablePort(3) 624 } 625 MAX-ACCESS read-write 626 STATUS current 627 DESCRIPTION 628 "This object identifies the action taken when an 629 intrusion occurs. See hpSecPtLearnMode for what 630 constitutes an intrusion. 631 disable. No trap is sent and the port 632 remains enabled. 633 SendTrap. If the hpSecPtIntrusionFlag is 634 set to noIntrusion, the agent will generate 635 an intrusionTrap. 636 SendTrapAndDisablePort. If the hpSecPtIntru- 637 sionFlag is set to noIntrusion, the agent 638 generate an intrusionTrap and disable 639 the port. This value does not apply to 640 repeaters." 641 ::= { hpSecurePortEntry 6 } 642 643 hpSecPtIntrusionFlag OBJECT-TYPE 644 SYNTAX INTEGER { 645 intrusion(1), 646 noIntrusion(2) 647 } 648 MAX-ACCESS read-write 649 STATUS current 650 DESCRIPTION 651 "This flag indicates if an intrusion has occured 652 on this port. Security-related LED(s) on the 653 device will blink if any instance of this flag 654 has the value intrusion. Setting this flag to 655 noIntrusion will turn off the appropriate LED(s). 656 An intrusion will only cause an alarm and an 657 intrusion log entry if this flag is equal to 658 noIntrusion. On a switch, packets causing 659 intrusions will be not be forwarded." 660 ::= { hpSecurePortEntry 7 } 661 662 hpSecureCfgAddrTable OBJECT-TYPE 663 SYNTAX SEQUENCE OF HpSecureCfgAddrEntry 664 MAX-ACCESS not-accessible 665 STATUS current 666 DESCRIPTION 667 "Table containing multiple configured authorized 668 addresses per port. Facilitates security 669 for ports whose hpSecPtLearnMode is set to 670 configureSpecific." 671 ::= { hubSecurity 4 } 672 673 hpSecureCfgAddrEntry OBJECT-TYPE 674 SYNTAX HpSecureCfgAddrEntry 675 MAX-ACCESS not-accessible 676 STATUS current 677 DESCRIPTION 678 "An entry in the hpSecureCfgAddrTable, containing 679 the configured authorized address for a single 680 port. Entries are stored in nonvolatile memory 681 when either the hpSecPtrLearnMode for the port 682 is changed to configureSpecific, or a new entry 683 is configured while hpSecPtrLearnMode for the 684 port is currently set to configureSpecific." 685 INDEX { hpSecCfgAddrGroupIndex, 686 hpSecCfgAddrPortIndex, 687 hpSecCfgAddress} 688 ::= { hpSecureCfgAddrTable 1 } 689 690 HpSecureCfgAddrEntry ::= 691 SEQUENCE { 692 hpSecCfgAddrGroupIndex Integer32, 693 hpSecCfgAddrPortIndex Integer32, 694 hpSecCfgAddress MacAddress, 695 hpSecCfgStatus RowStatus 696 } 697 698 hpSecCfgAddrGroupIndex OBJECT-TYPE 699 SYNTAX Integer32 (1..2147483647) 700 MAX-ACCESS not-accessible 701 STATUS current 702 DESCRIPTION 703 "This object identifies the group containing the 704 port for which this entry contains the configured 705 authorized address. On repeater systems, 706 this can be used to identify a specific repeater 707 within a managed stack of repeaters. On switch 708 systems, stacked or unstacked, this value is 709 always one." 710 ::= { hpSecureCfgAddrEntry 1 } 711 712 hpSecCfgAddrPortIndex OBJECT-TYPE 713 SYNTAX Integer32 (1..2147483647) 714 MAX-ACCESS not-accessible 715 STATUS current 716 DESCRIPTION 717 "This object identifies the port within the group 718 for which this entry contains the configured 719 authorized address. On a switch, this index 720 corresponds to the ifIndex of the port." 721 ::= { hpSecureCfgAddrEntry 2 } 722 723 hpSecCfgAddress OBJECT-TYPE 724 SYNTAX MacAddress 725 MAX-ACCESS not-accessible 726 STATUS current 727 DESCRIPTION 728 "A specific authorized MAC address for this port 729 configured by a management station." 730 ::= { hpSecureCfgAddrEntry 3 } 731 732 hpSecCfgStatus OBJECT-TYPE 733 SYNTAX RowStatus 734 MAX-ACCESS read-create 735 STATUS current 736 DESCRIPTION 737 "The row status of a hpSecureCfgAddrEntry." 738 ::= { hpSecureCfgAddrEntry 4 } 739 740 741 hpSecureAuthAddrTable OBJECT-TYPE 742 SYNTAX SEQUENCE OF HpSecureAuthAddrEntry 743 MAX-ACCESS not-accessible 744 STATUS current 745 DESCRIPTION 746 "Table containing the authorized addresses for 747 each port. An authorized address is an address 748 learned while the hpSecPtLearnMode for the port 749 is set to learnContinuous, learnFirstN, 750 learnLimitedContinuous, or learnFirstNConditionally; 751 or an address in the hpSecureCfgAddrTable when the 752 hpSecPtLearnMode for the port is set to configureSpecific. 753 On a switch, for ports whose hpSecPtLearnMode 754 is set to learnContinuous or learnLimitedContinuous, 755 this table may return MAC address information based 756 on the switch's 802.1d forwarding database." 757 ::= { hubSecurity 5 } 758 759 hpSecureAuthAddrEntry OBJECT-TYPE 760 SYNTAX HpSecureAuthAddrEntry 761 MAX-ACCESS not-accessible 762 STATUS current 763 DESCRIPTION 764 "An entry in the hpSecureAuthAddrTable, 765 containing the authorized address for a single 766 port. Entries are stored in nonvolatile memory 767 except when the port's hpSecPtLearnMode is set 768 to learnContinuous or learnLimitedContinuous." 769 770 INDEX { hpSecAuthAddrGroupIndex, 771 hpSecAuthAddrPortIndex, 772 hpSecAuthAddress } 773 ::= { hpSecureAuthAddrTable 1 } 774 775 HpSecureAuthAddrEntry ::= 776 SEQUENCE { 777 hpSecAuthAddrGroupIndex Integer32, 778 hpSecAuthAddrPortIndex Integer32, 779 hpSecAuthAddress MacAddress 780 } 781 782 hpSecAuthAddrGroupIndex OBJECT-TYPE 783 SYNTAX Integer32 (1..2147483647) 784 MAX-ACCESS not-accessible 785 STATUS current 786 DESCRIPTION 787 "This object identifies the group containing the 788 port for which this entry contains authorized 789 address information. On repeater systems, 790 this can be used to identify a specific repeater 791 within a managed stack of repeaters. On switch 792 systems, stacked or unstacked, this value is 793 always one." 794 ::= { hpSecureAuthAddrEntry 1 } 795 796 hpSecAuthAddrPortIndex OBJECT-TYPE 797 SYNTAX Integer32 (1..2147483647) 798 MAX-ACCESS not-accessible 799 STATUS current 800 DESCRIPTION 801 "This object identifies the port within the group 802 for which this entry contains authorized 803 address information. On a switch, this index 804 corresponds to ifIndex of the port." 805 ::= { hpSecureAuthAddrEntry 2 } 806 807 hpSecAuthAddress OBJECT-TYPE 808 SYNTAX MacAddress 809 MAX-ACCESS read-only 810 STATUS current 811 DESCRIPTION 812 "The MAC address of the station authorized to be 813 on this port. See hpSecureAuthAddrTable for 814 the definition of 'authorized address'." 815 ::= { hpSecureAuthAddrEntry 3 } 816 817 818 819 -- The Generic Repeater backup links group 820 821 hpicfGRpBackupLinks 822 OBJECT IDENTIFIER ::= { hpicfGenericRepeater 2 } 823 824 hpicfBackupLinkNextIndex OBJECT-TYPE 825 SYNTAX Integer32 (0..65535) 826 MAX-ACCESS read-write 827 STATUS current 828 DESCRIPTION 829 "A currently unassigned value of 830 hpicfBackupLinkIndex. The value 0 indicates that no 831 unassigned values are available. 832 833 In order to cause a non-zero value of this object to 834 be assigned for use as the hpicfBackupLinkIndex of a 835 future backup link configuration, it must be 836 successfully modified by a set operation. When 837 modified by a set operation, the new value must 838 precisely match the value presently held by the 839 object. If not, the management protocol set 840 operation will fail. 841 842 Immediately after the completion of a successful set 843 operation, the agent must modify the value of this 844 object. The algorithm for modifying the value is 845 implementation-dependent, and may use a subset of 846 values within the legal range. However, the agent 847 must guarantee that the new value is not assigned to 848 any in-use value of hpicfBackupLinkIndex. 849 850 A management station creates a new backup link using 851 this algorithm: 852 853 - issue a management protocol retrieval operation 854 to obtain the value of hpicfBackupLinkNextIndex; 855 if the retrieved value is zero, a new backup 856 link cannot be created at this time; 857 858 - issue a management protocol set operation for 859 hpicfBackupLinkNextIndex, supplying the same 860 value as obtained in the previous step; 861 862 - if the set operation succeeds, use the supplied 863 value as the hpicfBackupLinkIndex of the new 864 backup link; if the set operation fails, go back 865 to the first step and obtain a new value for 866 hpicfBackupLinkNextIndex; 867 868 - issue a management protocol set operation to 869 create an instance of the hpicfBackupLinkStatus 870 object setting its value to 'createAndGo' or 871 'createAndWait' (as specified in the description 872 of the RowStatus textual convention). 873 874 Note that the set of hpicfBackupLinkNextIndex and 875 the instance of hpicfBackupLinkStatus may occur in 876 the same set operation if desired." 877 ::= { hpicfGRpBackupLinks 1 } 878 879 hpicfBackupLinkTable OBJECT-TYPE 880 SYNTAX SEQUENCE OF HpicfBackupLinkEntry 881 MAX-ACCESS not-accessible 882 STATUS current 883 DESCRIPTION 884 "A table of backup link configuration entries. For 885 a given backup link, the agent will periodically send 886 a test packet to the device at the specified address. 887 If no response is received after a configured number 888 of test packets are sent, the agent will enable the 889 backup port and disable the primary port, and will 890 stop sending periodic test packets. After the agent 891 has switched to the backup link, the primary port 892 will need to explicitly be re-enabled via management 893 action in order to return to using the primary port. 894 895 At any time, a management station can examine the 896 associated instance of the hpicfBackupLinkState 897 object to determine if the backup port is currently 898 in use. 899 900 The backup link algorithm enables and disables the 901 backup port by modifying the instance of the 902 rptrPortAdminStatus object corresponding to that 903 port. After the backup port has been enabled by the 904 backup link algorithm, if the primary port is 905 subsequently enabled via management action, the 906 backup port will be turned off and the periodic 907 test packets will resume. 908 909 When a row of this table is activated, the backup 910 port will be disabled, the primary port will be 911 enabled, and the periodic test packets will be sent. 912 The time between test packets is configurable using 913 the associated instance of the 914 hpicfBackupLinkTestTime object. The number of 915 failures needed to switch to the backup port is 916 configurable using the associated instance of the 917 hpicfBackupLinkConsecFailures object. The backup 918 link function can be disabled by setting the relevant 919 instance of the hpicfBackupLinkStatus object to 920 either 'notInService' or 'destroy'. 921 922 Note that the primary port for a backup link must 923 be mapped to a repeater segment that the agent is 924 capable of transmitting through. In addition, a 925 given port cannot be used in more than one active 926 backup link at the same time." 927 ::= { hpicfGRpBackupLinks 2 } 928 929 hpicfBackupLinkEntry OBJECT-TYPE 930 SYNTAX HpicfBackupLinkEntry 931 MAX-ACCESS not-accessible 932 STATUS current 933 DESCRIPTION 934 "A row in the table, containing information about a 935 single backup link." 936 INDEX { hpicfBackupLinkIndex } 937 ::= { hpicfBackupLinkTable 1 } 938 939 HpicfBackupLinkEntry ::= 940 SEQUENCE { 941 hpicfBackupLinkIndex Integer32, 942 hpicfBackupLinkPrimaryGroup Integer32, 943 hpicfBackupLinkPrimaryPort Integer32, 944 hpicfBackupLinkBackupGroup Integer32, 945 hpicfBackupLinkBackupPort Integer32, 946 hpicfBackupLinkAddress MacAddress, 947 hpicfBackupLinkTestTime Integer32, 948 hpicfBackupLinkConsecFailures Integer32, 949 hpicfBackupLinkState INTEGER, 950 hpicfBackupLinkFailEventIndex Integer32, 951 hpicfBackupLinkStatus RowStatus 952 } 953 954 hpicfBackupLinkIndex OBJECT-TYPE 955 SYNTAX Integer32 (1..65535) 956 MAX-ACCESS not-accessible 957 STATUS current 958 DESCRIPTION 959 "The value of this object uniquely identifies this 960 backup link." 961 ::= { hpicfBackupLinkEntry 1 } 962 963 hpicfBackupLinkPrimaryGroup OBJECT-TYPE 964 SYNTAX Integer32 (1..2147483647) 965 MAX-ACCESS read-create 966 STATUS current 967 DESCRIPTION 968 "The group containing the primary port for this 969 backup link." 970 ::= { hpicfBackupLinkEntry 2 } 971 972 hpicfBackupLinkPrimaryPort OBJECT-TYPE 973 SYNTAX Integer32 (1..2147483647) 974 MAX-ACCESS read-create 975 STATUS current 976 DESCRIPTION 977 "The port number within the group of the primary port 978 for this backup link." 979 ::= { hpicfBackupLinkEntry 3 } 980 981 hpicfBackupLinkBackupGroup OBJECT-TYPE 982 SYNTAX Integer32 (1..2147483647) 983 MAX-ACCESS read-create 984 STATUS current 985 DESCRIPTION 986 "The group containing the backup port for this 987 backup link." 988 ::= { hpicfBackupLinkEntry 4 } 989 990 hpicfBackupLinkBackupPort OBJECT-TYPE 991 SYNTAX Integer32 (1..2147483647) 992 MAX-ACCESS read-create 993 STATUS current 994 DESCRIPTION 995 "The port number within the group of the backup port 996 for this backup link." 997 ::= { hpicfBackupLinkEntry 5 } 998 999 hpicfBackupLinkAddress OBJECT-TYPE 1000 SYNTAX MacAddress 1001 MAX-ACCESS read-create 1002 STATUS current 1003 DESCRIPTION 1004 "The MAC address of the device to which periodic 1005 test packets are sent in order to determine if the 1006 primary link is operational." 1007 ::= { hpicfBackupLinkEntry 6 } 1008 1009 hpicfBackupLinkTestTime OBJECT-TYPE 1010 SYNTAX Integer32 (1..15) 1011 MAX-ACCESS read-create 1012 STATUS current 1013 DESCRIPTION 1014 "The frequency, in seconds, between sending periodic 1015 test packets. The test packet response timeout is 1016 fixed at 500ms." 1017 DEFVAL { 1 } 1018 ::= { hpicfBackupLinkEntry 7 } 1019 1020 hpicfBackupLinkConsecFailures OBJECT-TYPE 1021 SYNTAX Integer32 (1..16) 1022 MAX-ACCESS read-create 1023 STATUS current 1024 DESCRIPTION 1025 "The number of consecutive test packet failures which 1026 will cause the agent to switch to the backup port 1027 (i.e., backup port turned on, primary port turned 1028 off). A value of one is generally not recommended 1029 and will cause the backup link to be enabled upon 1030 the first failure." 1031 DEFVAL { 2 } 1032 ::= { hpicfBackupLinkEntry 8 } 1033 1034 hpicfBackupLinkState OBJECT-TYPE 1035 SYNTAX INTEGER { 1036 notActive(1), 1037 usingPrimary(2), 1038 usingBackup(3) 1039 } 1040 MAX-ACCESS read-only 1041 STATUS current 1042 DESCRIPTION 1043 "The current state of this backup link. One of the 1044 following values: 1045 1046 notActive - backup link not running because 1047 this row has not yet been made 1048 active 1049 usingPrimary - backup link is running and using 1050 the primary port 1051 usingBackup - backup link test has failed; the 1052 primary port has been disabled 1053 and the backup port has been 1054 enabled" 1055 ::= { hpicfBackupLinkEntry 9 } 1056 1057 hpicfBackupLinkFailEventIndex OBJECT-TYPE 1058 SYNTAX Integer32 (0..65535) 1059 MAX-ACCESS read-create 1060 STATUS current 1061 DESCRIPTION 1062 "The index of the eventEntry in the RMON MIB that 1063 will be triggered whenever the value of 1064 hpicfBackupLinkState changes from 'usingPrimary' to 1065 'usingBackup'. The eventEntry identified by a 1066 particular value of this index is the same as 1067 identified by the same value of the eventIndex 1068 object. If there is no corresponding entry in the 1069 eventTable, then no association exists. In 1070 particular, if this value is zero, no associated 1071 event will be generated, as zero is not a valid 1072 event index." 1073 ::= { hpicfBackupLinkEntry 10 } 1074 1075 hpicfBackupLinkStatus OBJECT-TYPE 1076 SYNTAX RowStatus 1077 MAX-ACCESS read-create 1078 STATUS current 1079 DESCRIPTION 1080 "The status of this entry. This object may not be 1081 set to 'active' unless the corresponding instance of 1082 hpicfBackupLinkAddress has been set to a valid 1083 unicast address, the corresponding instances of 1084 hpicfBackupLinkPrimaryGroup, 1085 hpicfBackupLinkPrimaryPort, 1086 hpicfBackupLinkBackupGroup, and 1087 hpicfBackupLinkBackupPort have been configured to 1088 refer to two existing ports and that those ports are 1089 not used in any other active backup link 1090 configuration, and the primary port is mapped to a 1091 repeater segment which the agent is capable of 1092 transmitting through." 1093 ::= { hpicfBackupLinkEntry 11 } 1094 1095 1096 -- The generic repeater port mapping group 1097 1098 hpGRpPortMapping 1099 OBJECT IDENTIFIER ::= { hpicfGenericRepeater 3 } 1100 1101 hpGRpPMSegmentTable OBJECT-TYPE 1102 SYNTAX SEQUENCE OF HpGRpPMSegmentEntry 1103 MAX-ACCESS not-accessible 1104 STATUS current 1105 DESCRIPTION 1106 "A table for configuring segment-to-repeater mapping 1107 for repeater segments in this managed system." 1108 ::= { hpGRpPortMapping 1 } 1109 1110 hpGRpPMSegmentEntry OBJECT-TYPE 1111 SYNTAX HpGRpPMSegmentEntry 1112 MAX-ACCESS not-accessible 1113 STATUS current 1114 DESCRIPTION 1115 "An entry in the table, containing mapping 1116 information about a single repeater segment." 1117 INDEX { hpGRpPMSegmentIndex } 1118 ::= { hpGRpPMSegmentTable 1 } 1119 1120 HpGRpPMSegmentEntry ::= 1121 SEQUENCE { 1122 hpGRpPMSegmentIndex Integer32, 1123 hpGRpPMCurrentRptrIndex Integer32 1124 } 1125 1126 hpGRpPMSegmentIndex OBJECT-TYPE 1127 SYNTAX Integer32 (1..2147483647) 1128 MAX-ACCESS not-accessible 1129 STATUS current 1130 DESCRIPTION 1131 "The value of an instance of this object uniquely 1132 identifies a physical repeater segment in this 1133 managed system. The value of an instance of this 1134 object will be equal to the instance of the Entity 1135 MIB's entPhysicalIndex for the entry in the 1136 entPhysicalTable that represents this segment." 1137 ::= { hpGRpPMSegmentEntry 1 } 1138 1139 hpGRpPMCurrentRptrIndex OBJECT-TYPE 1140 SYNTAX Integer32 (1..2147483647) 1141 MAX-ACCESS read-write 1142 STATUS current 1143 DESCRIPTION 1144 "The index of the repeater that this segment is 1145 currently connected to. Changing this value has the 1146 effect of moving all ports on this segment to a 1147 different repeater. The hpGRpPMSegAllowedRptrTable 1148 should be consulted to determine which repeaters 1149 this segment can be connected to." 1150 ::= { hpGRpPMSegmentEntry 3 } 1151 1152 1153 hpGRpPMSegAllowedRptrTable OBJECT-TYPE 1154 SYNTAX SEQUENCE OF HpGRpPMSegAllowedRptrEntry 1155 MAX-ACCESS not-accessible 1156 STATUS current 1157 DESCRIPTION 1158 "This table is used to inform a management 1159 application about which repeaters a physical segment 1160 is able to be connected to. There is one row in this 1161 table for each allowable segment-to-repeater 1162 connection." 1163 ::= { hpGRpPortMapping 2 } 1164 1165 hpGRpPMSegAllowedRptrEntry OBJECT-TYPE 1166 SYNTAX HpGRpPMSegAllowedRptrEntry 1167 MAX-ACCESS not-accessible 1168 STATUS current 1169 DESCRIPTION 1170 "A row in the table, containing a single allowable 1171 segment-to-repeater connection. The presence of a 1172 row indicates that the segment identified by 1173 hpGRpPMSegmentIndex can be mapped to the repeater 1174 identified by hpGRpPMSegAllowedRptrIndex." 1175 INDEX { hpGRpPMSegmentIndex, 1176 hpGRpPMSegAllowedRptrIndex } 1177 ::= { hpGRpPMSegAllowedRptrTable 1 } 1178 1179 HpGRpPMSegAllowedRptrEntry ::= 1180 SEQUENCE { 1181 hpGRpPMSegAllowedRptrIndex Integer32 1182 } 1183 1184 hpGRpPMSegAllowedRptrIndex OBJECT-TYPE 1185 SYNTAX Integer32 (1..2147483647) 1186 MAX-ACCESS read-only 1187 STATUS current 1188 DESCRIPTION 1189 "The repeater index that identifies a repeater that 1190 this segment is able to be connected to." 1191 ::= { hpGRpPMSegAllowedRptrEntry 1 } 1192 1193 1194 hpGRpPMPortTable OBJECT-TYPE 1195 SYNTAX SEQUENCE OF HpGRpPMPortEntry 1196 MAX-ACCESS not-accessible 1197 STATUS current 1198 DESCRIPTION 1199 "A table for configuring port-to-repeater mapping 1200 for repeater ports in this managed system." 1201 ::= { hpGRpPortMapping 3 } 1202 1203 hpGRpPMPortEntry OBJECT-TYPE 1204 SYNTAX HpGRpPMPortEntry 1205 MAX-ACCESS not-accessible 1206 STATUS current 1207 DESCRIPTION 1208 "An entry in the table, containing mapping 1209 information about a single repeater port." 1210 INDEX { hpGRpPMPortGroupIndex, hpGRpPMPortIndex } 1211 ::= { hpGRpPMPortTable 1 } 1212 1213 HpGRpPMPortEntry ::= 1214 SEQUENCE { 1215 hpGRpPMPortGroupIndex Integer32, 1216 hpGRpPMPortIndex Integer32, 1217 hpGRpPMPortEntPhysicalIndex Integer32, 1218 hpGRpPMPortCurrentRptrIndex Integer32 1219 } 1220 1221 hpGRpPMPortGroupIndex OBJECT-TYPE 1222 SYNTAX Integer32 (1..2147483647) 1223 MAX-ACCESS not-accessible 1224 STATUS current 1225 DESCRIPTION 1226 "The group containing the port for which this entry 1227 contains mapping information." 1228 ::= { hpGRpPMPortEntry 1 } 1229 1230 hpGRpPMPortIndex OBJECT-TYPE 1231 SYNTAX Integer32 (1..2147483647) 1232 MAX-ACCESS not-accessible 1233 STATUS current 1234 DESCRIPTION 1235 "The port within the group for which this entry 1236 contains mapping information." 1237 ::= { hpGRpPMPortEntry 2 } 1238 1239 hpGRpPMPortEntPhysicalIndex OBJECT-TYPE 1240 SYNTAX Integer32 (1..2147483647) 1241 MAX-ACCESS read-only 1242 STATUS current 1243 DESCRIPTION 1244 "This object indicates which entry in the Entity 1245 MIB's entPhysicalTable represents this port. The 1246 entPhysicalEntry identified by this value is the 1247 same entry identified by the same value of the 1248 entPhysicalIndex object." 1249 ::= { hpGRpPMPortEntry 3 } 1250 1251 hpGRpPMPortCurrentRptrIndex OBJECT-TYPE 1252 SYNTAX Integer32 (0..2147483647) 1253 MAX-ACCESS read-write 1254 STATUS current 1255 DESCRIPTION 1256 "The index of the repeater that this port is 1257 currently mapped to. Changing this value has the 1258 effect of moving this port to a different repeater. 1259 The hpGRpPMPortAllowedRptrTable should be consulted 1260 to determine which repeaters this port can be mapped 1261 to. A value of zero indicates that this port is 1262 currently not a member of any repeater." 1263 ::= { hpGRpPMPortEntry 4 } 1264 1265 1266 hpGRpPMPortAllowedRptrTable OBJECT-TYPE 1267 SYNTAX SEQUENCE OF HpGRpPMPortAllowedRptrEntry 1268 MAX-ACCESS not-accessible 1269 STATUS current 1270 DESCRIPTION 1271 "This table is used to inform a management 1272 application about which repeaters a logical port is 1273 able to be mapped to. There is one row in this table 1274 for each allowable port to repeater mapping." 1275 ::= { hpGRpPortMapping 4 } 1276 1277 hpGRpPMPortAllowedRptrEntry OBJECT-TYPE 1278 SYNTAX HpGRpPMPortAllowedRptrEntry 1279 MAX-ACCESS not-accessible 1280 STATUS current 1281 DESCRIPTION 1282 "A row in the table, containing a single allowable 1283 port to repeater mapping. The presence of a row 1284 indicates that the port identified by 1285 hpGRpPMPortGroupIndex, hpGRpPMPortIndex can be 1286 mapped to the repeater identified by 1287 hpGRpPMPortAllowedRptrIndex." 1288 INDEX { hpGRpPMPortGroupIndex, hpGRpPMPortIndex, 1289 hpGRpPMPortAllowedRptrIndex } 1290 ::= { hpGRpPMPortAllowedRptrTable 1 } 1291 1292 HpGRpPMPortAllowedRptrEntry ::= 1293 SEQUENCE { 1294 hpGRpPMPortAllowedRptrIndex Integer32 1295 } 1296 1297 hpGRpPMPortAllowedRptrIndex OBJECT-TYPE 1298 SYNTAX Integer32 (1..2147483647) 1299 MAX-ACCESS read-only 1300 STATUS current 1301 DESCRIPTION 1302 "The repeater index that identifies a repeater that 1303 this port is able to be mapped to." 1304 ::= { hpGRpPMPortAllowedRptrEntry 1 } 1305 1306 1307 -- The generic repeater load balancing group 1308 1309 hpGRpLoadBalancing 1310 OBJECT IDENTIFIER ::= { hpicfGenericRepeater 4 } 1311 1312 hpGRpPortMapAutoConfigEnable OBJECT-TYPE 1313 SYNTAX INTEGER { 1314 enabled(1), 1315 disabled(2) 1316 } 1317 MAX-ACCESS read-write 1318 STATUS current 1319 DESCRIPTION 1320 "If this object has the value 'enabled', when a 1321 switch is discovered in the stack, the repeater 1322 ports will be evenly distributed across the repeater 1323 segments if they had not previously been assigned 1324 to segments (in other words, if they are in their 1325 default state). If this object has the value 1326 'disabled', this automatic distribution of ports 1327 will not occur." 1328 ::= { hpGRpLoadBalancing 1 } 1329 1330 hpGRpLoadBalanceNow OBJECT-TYPE 1331 SYNTAX INTEGER { 1332 cantUndo(1), 1333 balancing(2), 1334 completed(3), 1335 undoLast(4) 1336 } 1337 MAX-ACCESS read-write 1338 STATUS current 1339 DESCRIPTION 1340 "Setting this object to 'balancing' will cause the 1341 agent to distribute ports in the stack across the 1342 repeater segments, attempting to balance the 1343 traffic load on each segment. When the agent has 1344 finished the load balancing, it will set the value 1345 of this object to 'completed'. Setting this object 1346 to 'undoLast' will cause the agent to return all of 1347 the ports to the segment they were on before the 1348 last load balancing. This object will have the 1349 value of 'cantUndo' if there has been no load 1350 balancing since the last agent reset or if the last 1351 load balancing has already been undone. This object 1352 can only be set to 'undoLast' when its current value 1353 is 'completed'." 1354 ::= { hpGRpLoadBalancing 2 } 1355 1356 hpGRpLastLoadBalanceTime OBJECT-TYPE 1357 SYNTAX TimeStamp 1358 MAX-ACCESS read-only 1359 STATUS current 1360 DESCRIPTION 1361 "This object contains the value of sysUpTime for 1362 the last time the hpGRPLoadBalanceNow object was 1363 set to 'balancing'. If load balancing has not been 1364 performed since the last agent reset, this object 1365 will have the value 0." 1366 ::= { hpGRpLoadBalancing 3 } 1367 1368 1369 -- Objects for configuring internal and external switches 1370 -- for switching between repeater segments in a repeater 1371 -- system. 1372 1373 hpicfGRpSwitchConfig 1374 OBJECT IDENTIFIER ::= { hpicfGenericRepeater 5 } 1375 1376 hpicfGRpSwitchTable OBJECT-TYPE 1377 SYNTAX SEQUENCE OF HpicfGRpSwitchEntry 1378 MAX-ACCESS not-accessible 1379 STATUS current 1380 DESCRIPTION 1381 "A table of switches, both internal and external, 1382 connected to ports in this repeater system. 1383 Typically, internal switches are added by the agent 1384 and cannot be removed by a management operation. 1385 External switches may be added or removed by 1386 management operations using the hpicfGRpSwitchStatus 1387 object." 1388 ::= { hpicfGRpSwitchConfig 1 } 1389 1390 hpicfGRpSwitchEntry OBJECT-TYPE 1391 SYNTAX HpicfGRpSwitchEntry 1392 MAX-ACCESS not-accessible 1393 STATUS current 1394 DESCRIPTION 1395 "An entry in the table, representing a single 1396 attached switch." 1397 INDEX { hpicfGRpSwitchIndex } 1398 ::= { hpicfGRpSwitchTable 1 } 1399 1400 HpicfGRpSwitchEntry ::= 1401 SEQUENCE { 1402 hpicfGRpSwitchIndex Integer32, 1403 hpicfGRpSwitchType INTEGER, 1404 hpicfGRpSwitchEntPhysicalIndex Integer32, 1405 hpicfGRpSwitchLinkCount Integer32, 1406 hpicfGRpSwitchStatus RowStatus 1407 } 1408 1409 hpicfGRpSwitchIndex OBJECT-TYPE 1410 SYNTAX Integer32 (1..31) 1411 MAX-ACCESS not-accessible 1412 STATUS current 1413 DESCRIPTION 1414 "An index used to uniquely identify this switch." 1415 ::= { hpicfGRpSwitchEntry 1 } 1416 1417 hpicfGRpSwitchType OBJECT-TYPE 1418 SYNTAX INTEGER { 1419 internal(1), 1420 external(2) 1421 } 1422 MAX-ACCESS read-only 1423 STATUS current 1424 DESCRIPTION 1425 "This object indicates whether this switch is an 1426 internal switch card or a switch external to the 1427 repeater system. This object will always be equal 1428 to 'external' for rows that are created using 1429 hpicfGRpSwitchStatus. For internal switches, the 1430 type of internal switch can be determined by 1431 examining the relevant instance of the 1432 entPhysicalType object." 1433 ::= { hpicfGRpSwitchEntry 2 } 1434 1435 hpicfGRpSwitchEntPhysicalIndex OBJECT-TYPE 1436 SYNTAX Integer32 (0..2147483647) 1437 MAX-ACCESS read-only 1438 STATUS current 1439 DESCRIPTION 1440 "For an internal switch, this object is the index 1441 in the entPhysicalTable for the internal switch 1442 card. For an external switch, the value of this 1443 object will be zero." 1444 ::= { hpicfGRpSwitchEntry 3 } 1445 1446 hpicfGRpSwitchLinkCount OBJECT-TYPE 1447 SYNTAX Integer32 (0..255) 1448 MAX-ACCESS read-create 1449 STATUS current 1450 DESCRIPTION 1451 "The number of links from this switch's ports to 1452 repeater ports in this repeater system. For internal 1453 switches, this object cannot be modified by a network 1454 management operation. For an external switch, when 1455 this object is set, a number of rows will be added to 1456 the hpicfGRpSwitchLinkTable equal to the value of 1457 this object. The values of hpicfGRpSwitchLinkIndex 1458 will be numbered from 1 to the value of this object. 1459 1460 An instance of this object may not be modified if 1461 the corresponding instance of the 1462 hpicfGRpSwitchStatus object would be equal to 1463 'active' both before and after the modification 1464 attempt." 1465 ::= { hpicfGRpSwitchEntry 4 } 1466 1467 hpicfGRpSwitchStatus OBJECT-TYPE 1468 SYNTAX RowStatus 1469 MAX-ACCESS read-create 1470 STATUS current 1471 DESCRIPTION 1472 "The status of this hpicfGRpSwitchEntry. 1473 1474 An entry may not exist in the active state unless 1475 the associated instance of the 1476 hpicfGRpSwitchLinkCount has been set to a non-zero 1477 value, and all associated instances of the 1478 hpicfGRpSwitchLinkRptrGroup and 1479 hpicfGRpSwitchLinkRptrPort objects have been set to 1480 non-zero values. 1481 1482 If this object is set to 'destroy', all associated 1483 entries in the hpicfGRpSwitchLinkTable shall be 1484 deleted." 1485 ::= { hpicfGRpSwitchEntry 5 } 1486 1487 1488 hpicfGRpSwitchLinkTable OBJECT-TYPE 1489 SYNTAX SEQUENCE OF HpicfGRpSwitchLinkEntry 1490 MAX-ACCESS not-accessible 1491 STATUS current 1492 DESCRIPTION 1493 "A table of links to switch ports for both internal 1494 and external switches that are connected to repeater 1495 ports in this repeater system." 1496 ::= { hpicfGRpSwitchConfig 2 } 1497 1498 hpicfGRpSwitchLinkEntry OBJECT-TYPE 1499 SYNTAX HpicfGRpSwitchLinkEntry 1500 MAX-ACCESS not-accessible 1501 STATUS current 1502 DESCRIPTION 1503 "An entry in the table, representing a single link 1504 to a switch port." 1505 INDEX { hpicfGRpSwitchIndex, 1506 hpicfGRpSwitchLinkIndex } 1507 ::= { hpicfGRpSwitchLinkTable 1 } 1508 1509 HpicfGRpSwitchLinkEntry ::= 1510 SEQUENCE { 1511 hpicfGRpSwitchLinkIndex Integer32, 1512 hpicfGRpSwitchLinkRptrGroup Integer32, 1513 hpicfGRpSwitchLinkRptrPort Integer32, 1514 hpicfGRpSwitchLinkState INTEGER 1515 } 1516 1517 hpicfGRpSwitchLinkIndex OBJECT-TYPE 1518 SYNTAX Integer32 (1..255) 1519 MAX-ACCESS not-accessible 1520 STATUS current 1521 DESCRIPTION 1522 "An identifier that uniquely identifies this switch 1523 link among all of the links associated with this 1524 switch. The values of this object are numbered 1525 consecutively from 1 to the value of the instance 1526 of the hpicfGRpSwitchLinkCount associated with this 1527 switch." 1528 ::= { hpicfGRpSwitchLinkEntry 1 } 1529 1530 hpicfGRpSwitchLinkRptrGroup OBJECT-TYPE 1531 SYNTAX Integer32 (0..2147483647) 1532 MAX-ACCESS read-write 1533 STATUS current 1534 DESCRIPTION 1535 "The group containing the repeater port to which this 1536 switch link is attached. For internal switches, this 1537 object may not be modified by a network management 1538 operation. For external switches, an instance of 1539 this object will be created with the value of zero. 1540 It must be modified to a non-zero value corresponding 1541 to a known repeater group index before the instance 1542 of the hpicfGRpSwitchStatus object associated with 1543 this switch can be set to 'active'. 1544 1545 An instance of this object may not be modified if 1546 the instance of the hpicfGRpSwitchStatus object 1547 associated with this switch would be equal to 1548 'active' both before and after the modification 1549 attempt." 1550 ::= { hpicfGRpSwitchLinkEntry 2 } 1551 1552 hpicfGRpSwitchLinkRptrPort OBJECT-TYPE 1553 SYNTAX Integer32 (0..2147483647) 1554 MAX-ACCESS read-write 1555 STATUS current 1556 DESCRIPTION 1557 "The repeater port within the group to which this 1558 switch link is attached. For internal switches, this 1559 object may not be modified by a network management 1560 operation. For external switches, an instance of 1561 this object will be created with the value of zero. 1562 It must be modified to a non-zero value corresponding 1563 to a known repeater port index before the instance 1564 of the hpicfGRpSwitchStatus object associated with 1565 this switch can be set to 'active'. 1566 1567 An instance of this object may not be modified if 1568 the instance of the hpicfGRpSwitchStatus object 1569 associated with this switch would be equal to 1570 'active' both before and after the modification 1571 attempt." 1572 ::= { hpicfGRpSwitchLinkEntry 3 } 1573 1574 hpicfGRpSwitchLinkState OBJECT-TYPE 1575 SYNTAX INTEGER { 1576 active(1), 1577 redundant(2) 1578 } 1579 MAX-ACCESS read-write 1580 STATUS current 1581 DESCRIPTION 1582 "This object indicates whether this switch link is 1583 enabled ('active') or disabled ('redundant') due to 1584 one of the following: 1585 1586 - There are more links to this switch than there 1587 are repeater segments. 1588 - The agent detected a switching loop. 1589 - The link is intended as a backup connection for 1590 other links on this switch. 1591 1592 There can only be one active link to the switch from 1593 each repeater segment, otherwise you will have a 1594 switching loop. Therefore, if more than one switch 1595 link is connected to repeater ports on the same 1596 repeater segment, only one of them may have the value 1597 'active'. All of the others must have the value 1598 'redundant." 1599 ::= { hpicfGRpSwitchLinkEntry 4 } 1600 1601 1602 hpicfGRpCurrentPrimarySwitch OBJECT-TYPE 1603 SYNTAX Integer32 (0..31) 1604 MAX-ACCESS read-only 1605 STATUS current 1606 DESCRIPTION 1607 "The hpicfGRpSwitchIndex of the switch that is 1608 currently the primary switch for this stack. The 1609 automatic port-to-segment distribution feature will 1610 make decisions based on which switch is the primary 1611 switch. A value of 0 indicates that there are no 1612 internal switches in the system, and no external 1613 switches have been configured." 1614 ::= { hpicfGRpSwitchConfig 3 } 1615 1616 hpicfGRpDesiredPrimarySwitch OBJECT-TYPE 1617 SYNTAX Integer32 (0..31) 1618 MAX-ACCESS read-write 1619 STATUS current 1620 DESCRIPTION 1621 "The hpicfGRpSwitchIndex of the switch that the 1622 network administrator wants to be the primary switch 1623 for this stack. If the value of this object is zero, 1624 the agent will select the primary switch. Note that 1625 the agent may choose to use a different switch as the 1626 primary switch if it is unable to locate the switch 1627 identified by this object." 1628 ::= { hpicfGRpSwitchConfig 4 } 1629 1630 1631 -- Objects for configuring an internal bridge for 1632 -- bridging between repeater segments in a repeater 1633 -- system. 1634 1635 hpicfGRpBridge 1636 OBJECT IDENTIFIER ::= { hpicfGenericRepeater 6 } 1637 1638 hpGRpBridgeAdminStatus OBJECT-TYPE 1639 SYNTAX INTEGER { 1640 enable(1), 1641 disable(2) 1642 } 1643 MAX-ACCESS read-write 1644 STATUS current 1645 DESCRIPTION 1646 "" 1647 ::= { hpicfGRpBridge 1 } 1648 1649 1650 -- Generic repeater notifications 1651 1652 hpicfIntrusionTrap NOTIFICATION-TYPE 1653 OBJECTS { hubIntruderGroup, hubIntruderPort, 1654 hubIntruderAddress, hubIntruderType, 1655 hubIntruderTrainingViolation } 1656 STATUS current 1657 DESCRIPTION 1658 "The hpicfIntrusionTrap signifies that a port 1659 security violation has been detected on a port which 1660 has the hubSecPtAlarmEnable flag set to 'enabled'. 1661 or hpSecPtrIntrusionResponse set to 'SendTrap' 1662 or 'SendTrapAndDisablePort'. 1663 hubIntruderGroup identifies the group containing the 1664 port on which this intrusion occurred. 1665 hubIntruderPort identifies the port within the group 1666 on which this intrusion occurred. hubIntruderAddress 1667 contains the souce MAC address of the intruder. 1668 hubIntruderType identifies the type of violation that 1669 occured: address, training, or both. If the 1670 violation is of type 'training', the 1671 hubIntruderTrainingViolation object will indicate 1672 additional information on the type of violation." 1673 ::= { hpicfGenRptrTrapsPrefix 1 } 1674 1675 hpicfBackupLinkTrap NOTIFICATION-TYPE 1676 OBJECTS { hpicfBackupLinkState } 1677 STATUS current 1678 DESCRIPTION 1679 "The hpicfBackupLinkTrap signifies that the primary 1680 link for a backup link configuration has failed, and 1681 the agent has switched over to using the backup link. 1682 The instance of the hpicfBackupLinkState for the 1683 backup link configuration that experienced the 1684 primary link failure is included in the trap." 1685 ::= { hpicfGenRptrTrapsPrefix 2 } 1686 1687 1688 -- conformance information 1689 1690 hpicfGenRptrConformance 1691 OBJECT IDENTIFIER ::= { hpicfGenRptrMib 1 } 1692 1693 hpicfGenRptrCompliances 1694 OBJECT IDENTIFIER ::= { hpicfGenRptrConformance 1 } 1695 hpicfGenRptrGroups 1696 OBJECT IDENTIFIER ::= { hpicfGenRptrConformance 2 } 1697 1698 1699 -- compliance statements 1700 1701 hpicfHubSecurityCompliance MODULE-COMPLIANCE 1702 STATUS deprecated 1703 DESCRIPTION 1704 "********* THIS COMPLIANCE IS DEPRECATED ********* 1705 1706 The compliance statement for agents implementing 1707 per-port security in a single-repeater 802.3 1708 repeater system." 1709 MODULE 1710 MANDATORY-GROUPS { hpicfHubSecurityGroup } 1711 1712 ::= { hpicfGenRptrCompliances 1 } 1713 1714 hpicfGenRptrBasicCompliance MODULE-COMPLIANCE 1715 STATUS deprecated 1716 DESCRIPTION 1717 "********* THIS COMPLIANCE IS DEPRECATED ********* 1718 1719 The compliance statement for agents implementing 1720 management for a single repeater." 1721 MODULE 1722 MANDATORY-GROUPS { hpicfGenRptrBasicGroup } 1723 1724 GROUP hpicfGenRptrSecPtGroup 1725 DESCRIPTION 1726 "This group should be implemented for devices 1727 that support per-port security." 1728 1729 GROUP hpicfGenRptrSecNotifyGroup 1730 DESCRIPTION 1731 "This group should be implemented for devices 1732 that support per-port security." 1733 1734 OBJECT hubSecPtPreventEavesdrop 1735 MIN-ACCESS read-only 1736 DESCRIPTION 1737 "100VG hubs implement this object as read-only, 1738 since eavesdrop prevention is controlled by 1739 whether or not a port is allowed to train as 1740 promiscuous." 1741 1742 ::= { hpicfGenRptrCompliances 2 } 1743 1744 hpicfGenRptrSecurityCompliance MODULE-COMPLIANCE 1745 STATUS deprecated 1746 DESCRIPTION 1747 "********* THIS COMPLIANCE IS DEPRECATED ********* 1748 1749 The compliance statement for AdvanceStack 100VG 1750 slaves implementing security." 1751 MODULE 1752 MANDATORY-GROUPS { hpicfGenRptrSecPtGroup, 1753 hpicfGenRptrSecNotifyGroup } 1754 1755 OBJECT hubSecPtPreventEavesdrop 1756 MIN-ACCESS read-only 1757 DESCRIPTION 1758 "100VG hubs implement this object as read-only, 1759 since eavesdrop prevention is controlled by 1760 whether or not a port is allowed to train as 1761 promiscuous." 1762 1763 ::= { hpicfGenRptrCompliances 3 } 1764 1765 hpicfGenRptrCompliance MODULE-COMPLIANCE 1766 STATUS deprecated 1767 DESCRIPTION 1768 "********* THIS COMPLIANCE IS DEPRECATED ********* 1769 1770 The compliance statement for HP managed repeater 1771 systems." 1772 MODULE 1773 MANDATORY-GROUPS { hpicfGenRptrBasicGroup, 1774 hpicfGenRptrInfoGroup } 1775 1776 GROUP hpicfGenRptrSecPtGroup 1777 DESCRIPTION 1778 "This group should be implemented for devices 1779 that support per-port security." 1780 1781 GROUP hpicfGenRptrSecNotifyGroup 1782 DESCRIPTION 1783 "This group should be implemented for devices 1784 that support per-port security." 1785 1786 GROUP hpicfGenRptrBkpLinkGroup 1787 DESCRIPTION 1788 "This group should be implemented for devices 1789 that support backup link functionality." 1790 1791 GROUP hpicfGenRptrBkpLinkNotifyGroup 1792 DESCRIPTION 1793 "This group should be implemented for devices 1794 that support backup link functionality." 1795 1796 GROUP hpicfGenRptrPortMappingGroup 1797 DESCRIPTION 1798 "This group should be implemented for devices 1799 that support moving segments or ports between 1800 logical repeaters." 1801 1802 GROUP hpicfGenRptrLoadBalanceGroup 1803 DESCRIPTION 1804 "This group should be implemented for devices 1805 that have multiple repeater segments and an 1806 internal switch card and that support load 1807 balancing between segments." 1808 1809 OBJECT hubSecPtPreventEavesdrop 1810 MIN-ACCESS read-only 1811 DESCRIPTION 1812 "100VG hubs implement this object as read-only, 1813 since eavesdrop prevention is controlled by 1814 whether or not a port is allowed to train as 1815 promiscuous." 1816 1817 ::= { hpicfGenRptrCompliances 4 } 1818 1819 hpicfGenRptrCompliance2 MODULE-COMPLIANCE 1820 STATUS current 1821 DESCRIPTION 1822 "The compliance statement for HP managed repeater 1823 systems." 1824 MODULE 1825 MANDATORY-GROUPS { hpicfGenRptrBasicGroup, 1826 hpicfGenRptrInfoGroup } 1827 1828 GROUP hpicfGenRptrSecPtGroup 1829 DESCRIPTION 1830 "This group should be implemented for devices 1831 that support per-port security." 1832 1833 GROUP hpicfGenRptrSecNotifyGroup 1834 DESCRIPTION 1835 "This group should be implemented for devices 1836 that support per-port security." 1837 1838 GROUP hpicfGenRptrBkpLinkGroup 1839 DESCRIPTION 1840 "This group should be implemented for devices 1841 that support backup link functionality." 1842 1843 GROUP hpicfGenRptrBkpLinkNotifyGroup 1844 DESCRIPTION 1845 "This group should be implemented for devices 1846 that support backup link functionality." 1847 1848 GROUP hpicfGenRptrPortMappingGroup 1849 DESCRIPTION 1850 "This group should be implemented for devices 1851 that support moving segments or ports between 1852 logical repeaters." 1853 1854 GROUP hpicfGenRptrLoadBalanceGroup 1855 DESCRIPTION 1856 "This group should be implemented for devices 1857 that have multiple repeater segments, that can 1858 support internal switch cards and/or 1859 configuration of external switch links, and that 1860 support load balancing between segments." 1861 1862 GROUP hpicfGenRptrSwitchConfigGroup 1863 DESCRIPTION 1864 "This group should be implemented for repeaters 1865 that have multiple repeater segments and support 1866 internal switch cards and/or configuration of 1867 external switch links." 1868 1869 OBJECT hubSecPtPreventEavesdrop 1870 MIN-ACCESS read-only 1871 DESCRIPTION 1872 "100VG hubs implement this object as read-only, 1873 since eavesdrop prevention is controlled by 1874 whether or not a port is allowed to train as 1875 promiscuous." 1876 1877 ::= { hpicfGenRptrCompliances 5 } 1878 1879 hpicfGenRptrCompliance3 MODULE-COMPLIANCE 1880 STATUS current 1881 DESCRIPTION 1882 "The compliance statement for HP managed repeater 1883 systems." 1884 MODULE 1885 MANDATORY-GROUPS { hpicfGenRptrBasicGroup } 1886 1887 GROUP hpicfGenRptrInfoGroup 1888 DESCRIPTION 1889 "This group should be implemented for devices 1890 that support multiple repeater segments 1891 running at the same speed." 1892 1893 GROUP hpicfGenRptrSecPtGroup 1894 DESCRIPTION 1895 "This group should be implemented for devices 1896 that support per-port security." 1897 1898 GROUP hpicfSecPtGroup 1899 DESCRIPTION 1900 "This group should be implemented for devices 1901 that support per-port security with multiple 1902 authorized addresses per port." 1903 1904 GROUP hpicfGenRptrSecNotifyGroup 1905 DESCRIPTION 1906 "This group should be implemented for devices 1907 that support per-port security." 1908 1909 GROUP hpicfGenRptrBkpLinkGroup 1910 DESCRIPTION 1911 "This group should be implemented for devices 1912 that support backup link functionality." 1913 1914 GROUP hpicfGenRptrBkpLinkNotifyGroup 1915 DESCRIPTION 1916 "This group should be implemented for devices 1917 that support backup link functionality." 1918 1919 GROUP hpicfGenRptrPortMappingGroup 1920 DESCRIPTION 1921 "This group should be implemented for devices 1922 that support moving segments or ports between 1923 logical repeaters." 1924 1925 GROUP hpicfGenRptrLoadBalanceGroup 1926 DESCRIPTION 1927 "This group should be implemented for devices 1928 that have multiple repeater segments, that can 1929 support internal switch cards and/or 1930 configuration of external switch links, and that 1931 support load balancing between segments." 1932 1933 GROUP hpicfGenRptrSwitchConfigGroup 1934 DESCRIPTION 1935 "This group should be implemented for repeaters 1936 that have multiple repeater segments and support 1937 internal switch cards and/or configuration of 1938 external switch links." 1939 1940 GROUP hpicfGenRptrBridgeGroup 1941 DESCRIPTION 1942 "This group should be implemented for repeater 1943 systems that have an internal unmanaged bridge." 1944 1945 OBJECT hubSecPtPreventEavesdrop 1946 MIN-ACCESS read-only 1947 DESCRIPTION 1948 "100VG hubs implement this object as read-only, 1949 since eavesdrop prevention is controlled by 1950 whether or not a port is allowed to train as 1951 promiscuous." 1952 1953 ::= { hpicfGenRptrCompliances 6 } 1954 1955 hpicfGenRptrMultiSecOnlyCompliance MODULE-COMPLIANCE 1956 STATUS deprecated 1957 DESCRIPTION "********* THIS COMPLIANCE IS DEPRECATED ********* 1958 1959 The compliance statement for non-repeater devices 1960 that implement per-port security with multiple 1961 authorized address per port." 1962 MODULE 1963 MANDATORY-GROUPS { hpicfSecPtGroup } 1964 1965 ::= { hpicfGenRptrCompliances 7 } 1966 1967 hpicfGenRptrMultiSecOnlyCompliance2 MODULE-COMPLIANCE 1968 STATUS current 1969 DESCRIPTION 1970 "The updated compliance statement for non-repeater 1971 devices that implement per-port security with multiple 1972 authorized address per port." 1973 MODULE 1974 MANDATORY-GROUPS { hpicfSecPtGroup2 } 1975 1976 ::= { hpicfGenRptrCompliances 8 } 1977 1978 1979 -- units of conformance 1980 1981 1982 hpicfHubSecurityGroup OBJECT-GROUP 1983 OBJECTS { hubSecPtGroupIndex, 1984 hubSecPtPortIndex, 1985 hubSecPtSecurityAddress, 1986 hubSecPtAuthorizedAddress, 1987 hubSecPtPreventEavesdrop, 1988 hubSecPtAlarmEnable, 1989 hubSecPtIntrusionFlag, 1990 hubIntruderIndex, 1991 hubIntruderGroup, 1992 hubIntruderPort, 1993 hubIntruderAddress, 1994 hubIntruderTime 1995 } 1996 STATUS deprecated 1997 DESCRIPTION 1998 "********* THIS GROUP IS DEPRECATED ********* 1999 2000 A collection of objects for managing per-port 2001 security violations for a managed 802.3 repeater 2002 system." 2003 ::= { hpicfGenRptrGroups 1 } 2004 2005 hpicfGenRptrBasicGroup OBJECT-GROUP 2006 OBJECTS { hpGRpSelfHealEnable } 2007 STATUS current 2008 DESCRIPTION 2009 "A collection of objects for basic configuration 2010 of a system containing repeaters." 2011 ::= { hpicfGenRptrGroups 2 } 2012 2013 hpicfGenRptrSecPtGroup OBJECT-GROUP 2014 OBJECTS { hubSecPtGroupIndex, 2015 hubSecPtPortIndex, 2016 hubSecPtSecurityAddress, 2017 hubSecPtAuthorizedAddress, 2018 hubSecPtPreventEavesdrop, 2019 hubSecPtAlarmEnable, 2020 hubSecPtIntrusionFlag, 2021 hubIntruderIndex, 2022 hubIntruderGroup, 2023 hubIntruderPort, 2024 hubIntruderAddress, 2025 hubIntruderTime, 2026 hubIntruderType, 2027 hubIntruderTrainingViolation 2028 } 2029 STATUS current 2030 DESCRIPTION 2031 "A collection of objects for managing per-port 2032 security in a managed repeater system." 2033 ::= { hpicfGenRptrGroups 3 } 2034 2035 hpicfGenRptrInfoGroup OBJECT-GROUP 2036 OBJECTS { hpGRpRepeaterIfIndex, 2037 hpGRpRepeaterName, 2038 hpGRpRepeaterVlanIndex 2039 } 2040 STATUS current 2041 DESCRIPTION 2042 "A collection of objects providing information 2043 about logical repeaters in a system." 2044 ::= { hpicfGenRptrGroups 4 } 2045 2046 hpicfGenRptrBkpLinkGroup OBJECT-GROUP 2047 OBJECTS { hpicfBackupLinkNextIndex, 2048 hpicfBackupLinkPrimaryGroup, 2049 hpicfBackupLinkPrimaryPort, 2050 hpicfBackupLinkBackupGroup, 2051 hpicfBackupLinkBackupPort, 2052 hpicfBackupLinkAddress, 2053 hpicfBackupLinkTestTime, 2054 hpicfBackupLinkConsecFailures, 2055 hpicfBackupLinkState, 2056 hpicfBackupLinkFailEventIndex, 2057 hpicfBackupLinkStatus 2058 } 2059 STATUS current 2060 DESCRIPTION 2061 "A collection of objects for configuring backup 2062 links in a managed repeater system." 2063 ::= { hpicfGenRptrGroups 5 } 2064 2065 hpicfGenRptrPortMappingGroup OBJECT-GROUP 2066 OBJECTS { hpGRpPMCurrentRptrIndex, 2067 hpGRpPMSegAllowedRptrIndex, 2068 hpGRpPMPortEntPhysicalIndex, 2069 hpGRpPMPortCurrentRptrIndex, 2070 hpGRpPMPortAllowedRptrIndex, 2071 hpGRpPortMapAutoConfigEnable 2072 } 2073 STATUS current 2074 DESCRIPTION 2075 "A collection of objects for mapping repeater 2076 segments and repeater ports to logical repeaters." 2077 ::= { hpicfGenRptrGroups 6 } 2078 2079 hpicfGenRptrLoadBalanceGroup OBJECT-GROUP 2080 OBJECTS { hpGRpLoadBalanceNow, 2081 hpGRpLastLoadBalanceTime 2082 } 2083 STATUS current 2084 DESCRIPTION 2085 "A collection of objects for managing segment 2086 load balancing on multisegment repeaters with 2087 internal switches." 2088 ::= { hpicfGenRptrGroups 7 } 2089 2090 hpicfGenRptrSwitchConfigGroup OBJECT-GROUP 2091 OBJECTS { hpicfGRpSwitchType, 2092 hpicfGRpSwitchEntPhysicalIndex, 2093 hpicfGRpSwitchLinkCount, 2094 hpicfGRpSwitchStatus, 2095 hpicfGRpSwitchLinkRptrGroup, 2096 hpicfGRpSwitchLinkRptrPort, 2097 hpicfGRpSwitchLinkState, 2098 hpicfGRpCurrentPrimarySwitch, 2099 hpicfGRpDesiredPrimarySwitch 2100 } 2101 STATUS current 2102 DESCRIPTION 2103 "A collection of Objects for configuring internal and 2104 external switches for switching between repeater 2105 segments in a repeater system." 2106 ::= { hpicfGenRptrGroups 8 } 2107 2108 hpicfGenRptrSecNotifyGroup NOTIFICATION-GROUP 2109 NOTIFICATIONS { hpicfIntrusionTrap } 2110 STATUS current 2111 DESCRIPTION 2112 "A collection of notifications used to indicate 2113 per-port security violations." 2114 ::= { hpicfGenRptrGroups 9 } 2115 2116 hpicfGenRptrBkpLinkNotifyGroup NOTIFICATION-GROUP 2117 NOTIFICATIONS { hpicfBackupLinkTrap } 2118 STATUS current 2119 DESCRIPTION 2120 "A collection of notifications used to indicate 2121 state changes on a backup link." 2122 ::= { hpicfGenRptrGroups 10 } 2123 2124 hpicfSecPtGroup OBJECT-GROUP 2125 OBJECTS { hpSecPtAddressLimit, 2126 hpSecPtLearnMode, 2127 hpSecPtPreventEavesdrop, 2128 hpSecPtAlarmEnable, 2129 hpSecPtIntrusionFlag, 2130 hpSecCfgStatus, 2131 hpSecAuthAddress, 2132 hubIntruderIndex, 2133 hubIntruderGroup, 2134 hubIntruderPort, 2135 hubIntruderAddress, 2136 hubIntruderTime, 2137 hubIntruderType, 2138 hubIntruderTrainingViolation 2139 } 2140 STATUS deprecated 2141 DESCRIPTION 2142 "********* THIS GROUP IS DEPRECATED ********* 2143 2144 A collection of objects for managing per-port 2145 security in a managed repeater or switch system." 2146 ::= { hpicfGenRptrGroups 11 } 2147 2148 hpicfGenRptrBridgeGroup OBJECT-GROUP 2149 OBJECTS { hpGRpBridgeAdminStatus } 2150 STATUS current 2151 DESCRIPTION 2152 "A collection of objects for basic configuration 2153 of repeater system containing internal bridging." 2154 ::= { hpicfGenRptrGroups 12 } 2155 2156 hpicfSecPtGroup2 OBJECT-GROUP 2157 OBJECTS { hpSecPtAddressLimit, 2158 hpSecPtLearnMode, 2159 hpSecPtAlarmEnable, 2160 hpSecPtIntrusionFlag, 2161 hpSecCfgStatus, 2162 hpSecAuthAddress, 2163 hubIntruderIndex, 2164 hubIntruderGroup, 2165 hubIntruderPort, 2166 hubIntruderAddress, 2167 hubIntruderTime, 2168 hubIntruderType, 2169 hubIntruderTrainingViolation 2170 } 2171 STATUS current 2172 DESCRIPTION 2173 "A collection of objects for managing per-port 2174 security in a managed repeater or switch system." 2175 ::= { hpicfGenRptrGroups 13 } 2176 2177 END 2178 2179