1       HP-ICF-GENERIC-RPTR DEFINITIONS ::= BEGIN
2
3       IMPORTS
4           Integer32,
5           OBJECT-TYPE, MODULE-IDENTITY, NOTIFICATION-TYPE
6               FROM SNMPv2-SMI
7           MacAddress, DisplayString, RowStatus, TimeStamp
8               FROM SNMPv2-TC
9           MODULE-COMPLIANCE, OBJECT-GROUP, NOTIFICATION-GROUP
10               FROM SNMPv2-CONF
11           hpicfObjectModules, hpicfGenericRepeater, icfHub,
12           hpicfGenRptrTrapsPrefix
13               FROM HP-ICF-OID;
14
15       hpicfGenRptrMib MODULE-IDENTITY
16            LAST-UPDATED "200306092237Z"  -- June 9, 2003
17            ORGANIZATION "Hewlett Packard Company,
18                          Network Infrastructure Solutions"
19            CONTACT-INFO
20                    "Hewlett Packard Company
21                     8000 Foothills Blvd.
22                     Roseville, CA 95747"
23            DESCRIPTION
24                    "This MIB module contains object definitions that
25                    are common to all repeater devices in the HP
26                    Integrated Communication Facility product
27                    line."
28
29            REVISION     "200306092237Z"  -- June 9, 2003
30            DESCRIPTION  "Added learnLimitedContinuous mode to
31                          hpSecPtLearnMode."
32
33            REVISION     "200011030717Z"  -- November 3, 2000
34            DESCRIPTION  "Deprecate hpSecPtPreventEavesdrop.  Update
35                         division name."
36
37            REVISION     "9807230103Z"  -- July 23, 1998
38            DESCRIPTION
39                    "Added the hpicfGenRptrBridgeGroup.  Updated
40                    compliances."
41            REVISION     "9703060337Z"  -- March 6, 1997
42            DESCRIPTION
43                    "Added the hpicfGenRptrSwitchConfigGroup.  Added
44                    NOTIFICATION-GROUP information."
45            REVISION     "9609100228Z"  -- September 10, 1996
46            DESCRIPTION
47                    "Split this MIB module from the former monolithic
48                    hp-icf MIB.  Added the hpicfGenRptrInfoGroup, the
49                    hpicfGenRptrBkpLinkGroup, and the
50                    hpicfGenRptrPortMappingGroup."
51            REVISION     "9510232347Z"  -- October 23, 1995
52            DESCRIPTION
53                    "Version of MIB module that added support for
54                    the HPJ2413A and HPJ2415A 100VG hubs, and the
55                    HPJ2414B agent module.  Added the
56                    hpicfGenRptrSecPtGroup."
57            REVISION     "9501180000Z"  -- January 18, 1995
58            DESCRIPTION
59                   "Version of MIB module that added support for
60                   the HPJ2410A 100VG repeater and the HPJ2414A
61                   agent module.  Added the hpicfGenRptrBasicGroup."
62            REVISION     "9307090000Z"  -- July 9, 1993
63            DESCRIPTION
64                    "Initial version of this MIB module.  Released
65                    with the HPJ2355A hub."
66           ::= { hpicfObjectModules 8 }
67
68
69       hpGRpBasic
70           OBJECT IDENTIFIER ::= { hpicfGenericRepeater 1 }
71
72       hpGRpBasicGlobal
73           OBJECT IDENTIFIER ::= { hpGRpBasic 1 }
74
75       hpGRpSelfHealEnable OBJECT-TYPE
76           SYNTAX     INTEGER {
77                          enabled(1),
78                          disabled(2)
79                      }
80           MAX-ACCESS read-write
81           STATUS     current
82           DESCRIPTION
83                   "This flag controls whether or not the device will
84                   send self healing packets.  Self healing packets are
85                   normally sent once per second by the agent when no
86                   other traffic is present.  When there is no traffic
87                   present on a network, there is no way to detect
88                   cabling problems (or the repair of cabling problems)
89                   and status LEDs are not always correct.
90
91                   Enabling this flag allows the agent to detect cabling
92                   problems on an idle network.  This flag can be
93                   disabled if self healing packets are not wanted.
94
95                   On the 100BaseVG-AnyLAN SNMP/Bridge card, these
96                   packets are addressed to a unique unused unicast
97                   station address which has been reserved by HP for
98                   this purpose.  On 802.3 repeaters, these packets are
99                   self addressed.
100
101                   On an 802.3 repeater, this flag MUST be enabled when
102                   using the Robust Port Healing feature.  Without
103                   Robust Port Healing either a good transmit or a good
104                   receive will reconnect an autopartitioned port.  With
105                   Robust Port Healing the criteria is more restrictive
106                   and only a good transmit will heal a segmented port.
107                   If all ports are segmented, the repeater will not
108                   repeat anything until the agent transmits a self
109                   healing packet and reconnects the autopartitioned
110                   ports."
111           ::= { hpGRpBasicGlobal 1 }
112
113
114       hpGRpRepeaterTable OBJECT-TYPE
115           SYNTAX     SEQUENCE OF HpGRpRepeaterEntry
116           MAX-ACCESS not-accessible
117           STATUS     current
118           DESCRIPTION
119                   "A table containing generic information about the
120                   current logical repeaters in this managed system."
121           ::= { hpGRpBasicGlobal 2 }
122
123       hpGRpRepeaterEntry OBJECT-TYPE
124           SYNTAX     HpGRpRepeaterEntry
125           MAX-ACCESS not-accessible
126           STATUS     current
127           DESCRIPTION
128                   "An entry in the table, containing information about
129                   a single logical repeater."
130           INDEX      { hpGRpRepeaterIndex }
131           ::= { hpGRpRepeaterTable 1 }
132
133       HpGRpRepeaterEntry ::=
134           SEQUENCE {
135               hpGRpRepeaterIndex              Integer32,
136               hpGRpRepeaterIfIndex            Integer32,
137               hpGRpRepeaterName               DisplayString,
138               hpGRpRepeaterVlanIndex          Integer32
139           }
140
141       hpGRpRepeaterIndex OBJECT-TYPE
142           SYNTAX     Integer32 (1..2147483647)
143           MAX-ACCESS not-accessible
144           STATUS     current
145           DESCRIPTION
146                   "This object uniquely identifies the logical repeater
147                   in the managed system for which this entry contains
148                   information.  This object will have the same value
149                   as the corresponding 'repeater index' object in the
150                   media-specific repeater MIB for this repeater.  Note
151                   that it will also have the same value as the
152                   instance of the Entity MIB's entLogicalIndex for
153                   the entry in the entLogicalTable that represents
154                   this repeater."
155           ::= { hpGRpRepeaterEntry 1 }
156
157       hpGRpRepeaterIfIndex OBJECT-TYPE
158           SYNTAX     Integer32 (0..2147483647)
159           MAX-ACCESS read-only
160           STATUS     current
161           DESCRIPTION
162                   "The interface on the agent that is used to transmit
163                   and receive packets through this repeater.  The
164                   ifEntry identified by this value is the same entry
165                   identified by the same value of the ifIndex object.
166                   The value zero indicates that the agent has no
167                   interface through which it can send and receive
168                   packets on this repeater."
169           ::= { hpGRpRepeaterEntry 2 }
170
171       hpGRpRepeaterName OBJECT-TYPE
172           SYNTAX     DisplayString (SIZE(0..16))
173           MAX-ACCESS read-write
174           STATUS     current
175           DESCRIPTION
176                   "A friendly name for this repeater.  Management
177                   applications can use this to configure a user
178                   friendly name for this logical repeater."
179           ::= { hpGRpRepeaterEntry 3 }
180
181       hpGRpRepeaterVlanIndex OBJECT-TYPE
182           SYNTAX     Integer32 (0..65535)
183           MAX-ACCESS read-write
184           STATUS     current
185           DESCRIPTION
186                   "The virtual LAN that this repeater is on.  Note that
187                   setting this object does not affect the operation of
188                   the repeater in any way.  It is a 'notepad' for
189                   management applications to allow them to record
190                   which VLAN on a connected switch this logical
191                   repeater is connected to."
192           ::= { hpGRpRepeaterEntry 4 }
193
194
195       -- The Generic Repeater Security group.
196
197       hubSecurity           OBJECT IDENTIFIER ::= { icfHub 10 }
198
199       hubSecurePortTable OBJECT-TYPE
200           SYNTAX     SEQUENCE OF HubSecurePortEntry
201           MAX-ACCESS not-accessible
202           STATUS     current
203           DESCRIPTION
204                   "Table containing security configuration for each
205                   port."
206           ::= { hubSecurity 1 }
207
208       hubSecurePortEntry OBJECT-TYPE
209           SYNTAX     HubSecurePortEntry
210           MAX-ACCESS not-accessible
211           STATUS     current
212           DESCRIPTION
213                   "An entry in the hubSecurePortTable, containing
214                   the security configuration for a single port."
215           INDEX      { hubSecPtGroupIndex, hubSecPtPortIndex }
216           ::= { hubSecurePortTable 1 }
217
218       HubSecurePortEntry ::=
219           SEQUENCE {
220               hubSecPtGroupIndex              Integer32,
221               hubSecPtPortIndex               Integer32,
222               hubSecPtSecurityAddress         MacAddress,
223               hubSecPtAuthorizedAddress       MacAddress,
224               hubSecPtPreventEavesdrop        INTEGER,
225               hubSecPtAlarmEnable             INTEGER,
226               hubSecPtIntrusionFlag           INTEGER
227           }
228
229       hubSecPtGroupIndex OBJECT-TYPE
230           SYNTAX     Integer32 (1..2147483647)
231           MAX-ACCESS read-only
232           STATUS     current
233           DESCRIPTION
234                   "This object identifies the group containing the
235                   port for which this entry contains security
236                   configuration information."
237           ::= { hubSecurePortEntry 1 }
238
239       hubSecPtPortIndex  OBJECT-TYPE
240           SYNTAX     Integer32 (1..2147483647)
241           MAX-ACCESS read-only
242           STATUS     current
243           DESCRIPTION
244                   "This object identifies the port within the group
245                   for which this entry contains security
246                   configuration information."
247           ::= { hubSecurePortEntry 2 }
248
249       hubSecPtSecurityAddress OBJECT-TYPE
250           SYNTAX     MacAddress
251           MAX-ACCESS read-write
252           STATUS     current
253           DESCRIPTION
254                   "The desired authorized MAC address for this port.
255                   This can be either a regular station address to
256                   configure a specific address, or it can be one of
257                   the following special values to specify the
258                   address learning method:
259                       FFFF-FFFF-FFFE: learnOnce.  First source MAC
260                           address heard on this port becomes the
261                           authorized address.  Setting this value
262                           initiates learning of a new authorized
263                           address.  When a new authorized address is
264                           learned, it will be stored in nonvolatile
265                           memory.  This variable will return
266                           learnOnceConditionally to a GET operation
267                           after it has been set to this value.
268                       FFFF-FFFF-FFFD: learnOnceConditionally.  This
269                           option will initiate learning of a new
270                           authorized address only if the previous
271                           hubSecPtSecurityAddress was set to a
272                           specific address or learnContinuous.  No
273                           action will be performed if the previous
274                           value was already learnOnceConditionally.
275                       FFFF-FFFF-FFFC: learnContinuous.  Any address
276                           heard becomes the new authorized address.
277                           When a new address is learned, it may
278                           cause an alarm, but it does not store
279                           anything in nonvolatile memory."
280           ::= { hubSecurePortEntry 3 }
281
282       hubSecPtAuthorizedAddress OBJECT-TYPE
283           SYNTAX     MacAddress
284           MAX-ACCESS read-only
285           STATUS     current
286           DESCRIPTION
287                   "The MAC address of the station authorized to be
288                   on this port.  This address could either have been
289                   configured by specifying a regular station address
290                   for hubSecPtSecurityAddress, or it could have been
291                   learned by the agent if hubSecPtSecurityAddress
292                   was set to one of the special values listed above.
293                   Once the agent has learned an authorized address,
294                   it will be saved across powerfails, unless the
295                   agent was configured for learnContinuous mode."
296           ::= { hubSecurePortEntry 4 }
297
298       hubSecPtPreventEavesdrop OBJECT-TYPE
299           SYNTAX     INTEGER {
300                          enable(1),
301                          disable(2)
302                      }
303           MAX-ACCESS read-write
304           STATUS     current
305           DESCRIPTION
306                   "If enabled, unicast packets not addressed to the
307                   authorized address for this port will be
308                   scrambled."
309           ::= { hubSecurePortEntry 5 }
310
311       hubSecPtAlarmEnable OBJECT-TYPE
312           SYNTAX     INTEGER {
313                          enable(1),
314                          disable(2)
315                      }
316           MAX-ACCESS read-write
317           STATUS     current
318           DESCRIPTION
319                   "If enabled, the agent will generate an
320                   intrusionTrap if a packet is received on this port
321                   with a source MAC address that is different from
322                   the hubSecPtAuthorizedAddress for this port."
323           ::= { hubSecurePortEntry 6 }
324
325       hubSecPtIntrusionFlag OBJECT-TYPE
326           SYNTAX     INTEGER {
327                          intrusion(1),
328                          noIntrusion(2)
329                      }
330           MAX-ACCESS read-write
331           STATUS     current
332           DESCRIPTION
333                   "This flag indicates if an intrusion has occurred
334                   on this port.  The Security LED on the hub will
335                   blink if any instance of this flag has the value
336                   intrusion.  Setting this flag to noIntrusion will
337                   turn off the Security LED if no other ports have
338                   this flag set to intrusion.  An intrusion will
339                   only cause an alarm and an intrusion log entry if
340                   this flag is equal to noIntrusion."
341           ::= { hubSecurePortEntry 7 }
342
343       hubIntruderLogTable OBJECT-TYPE
344           SYNTAX     SEQUENCE OF HubIntruderLogEntry
345           MAX-ACCESS not-accessible
346           STATUS     current
347           DESCRIPTION
348                   "This table contains a record of the twenty most
349                   recent port security violations.  The first entry
350                   in the table is the oldest."
351           ::= { hubSecurity 2 }
352
353       hubIntruderLogEntry OBJECT-TYPE
354           SYNTAX     HubIntruderLogEntry
355           MAX-ACCESS not-accessible
356           STATUS     current
357           DESCRIPTION
358                   "A row in the hubIntruderLogTable containing
359                   information about a single port security
360                   violation."
361           INDEX     { hubIntruderIndex }
362           ::= { hubIntruderLogTable 1 }
363
364       HubIntruderLogEntry ::=
365           SEQUENCE {
366               hubIntruderIndex                Integer32,
367               hubIntruderGroup                Integer32,
368               hubIntruderPort                 Integer32,
369               hubIntruderAddress              MacAddress,
370               hubIntruderTime                 TimeStamp,
371               hubIntruderType                 INTEGER,
372               hubIntruderTrainingViolation    INTEGER
373           }
374
375       hubIntruderIndex OBJECT-TYPE
376           SYNTAX     Integer32 (1..20)
377           MAX-ACCESS read-only
378           STATUS     current
379           DESCRIPTION
380                   "The index of this entry in the intruder log
381                   table.  Index 1 will always contain the oldest
382                   entry.  If the table is full when a new intrusion
383                   occurs, the new entry becomes index 20, and all
384                   earlier entries are shifted down by one entry,
385                   removing the old index 1."
386           ::= { hubIntruderLogEntry 1 }
387
388       hubIntruderGroup OBJECT-TYPE
389           SYNTAX     Integer32 (0..2147483647)
390           MAX-ACCESS read-only
391           STATUS     current
392           DESCRIPTION
393                   "This object identifies the group containing the
394                   port on which this intrusion occurred."
395           ::= { hubIntruderLogEntry 2 }
396
397       hubIntruderPort  OBJECT-TYPE
398           SYNTAX     Integer32 (0..2147483647)
399           MAX-ACCESS read-only
400           STATUS     current
401           DESCRIPTION
402                   "This object identifies the port within the group
403                   on which this intrusion occurred.  A port number
404                   of zero indicates that this entry is unused and
405                   the values for the other variables in this entry
406                   are undefined."
407           ::= { hubIntruderLogEntry 3 }
408
409       hubIntruderAddress OBJECT-TYPE
410           SYNTAX     MacAddress
411           MAX-ACCESS read-only
412           STATUS     current
413           DESCRIPTION
414                   "This object contains the source MAC address of
415                   the intruder."
416           ::= { hubIntruderLogEntry 4 }
417
418       hubIntruderTime OBJECT-TYPE
419           SYNTAX     TimeStamp
420           MAX-ACCESS read-only
421           STATUS     current
422           DESCRIPTION
423                   "The value of sysUpTime when the intrusion
424                   occurred.  This will be zero if the agent has been
425                   reset since the intruder was detected, since
426                   sysUpTime could be misinterpreted in that case."
427           ::= { hubIntruderLogEntry 5 }
428
429       hubIntruderType OBJECT-TYPE
430           SYNTAX     INTEGER {
431                          address(1),
432                          training(2),
433                          both(3),
434                          none(4)
435                      }
436           MAX-ACCESS read-only
437           STATUS     current
438           DESCRIPTION
439                   "This object identifies the type of violation that
440                   occured: address, training, or both.  The
441                   hubIntruderTrainingViolation object will indicate
442                   additional information, if any, on the type of
443                   training violation.  This object will be equal to
444                   'none' if this log entry is unused.  Note that
445                   the values 'training' and 'both' are only valid
446                   for 802.12 ports."
447           ::= { hubIntruderLogEntry  6 }
448
449       hubIntruderTrainingViolation  OBJECT-TYPE
450           SYNTAX     INTEGER {
451                          noViolation(1),
452                          promiscuousViolation(2),
453                          repeaterViolation(3)
454                      }
455           MAX-ACCESS read-only
456           STATUS     current
457           DESCRIPTION
458                   "This object indicates the type of training
459                   violation.  Note that for 802.3 ports,
460                   this object will always be equal to 'noViolation'.
461                   This object will be equal to 'noViolation' if this
462                   log entry is unused."
463           ::= { hubIntruderLogEntry  7 }
464
465
466       hpSecurePortTable OBJECT-TYPE
467           SYNTAX     SEQUENCE OF HpSecurePortEntry
468           MAX-ACCESS not-accessible
469           STATUS     current
470           DESCRIPTION
471                   "Table containing security configuration
472                   for each port, where security for multiple
473                   MAC addresses per port is desired (e.g.,
474                   switch systems)."
475           ::= { hubSecurity 3 }
476
477       hpSecurePortEntry OBJECT-TYPE
478           SYNTAX     HpSecurePortEntry
479           MAX-ACCESS not-accessible
480           STATUS     current
481           DESCRIPTION
482                   "An entry in the hpSecurePortTable, containing
483                   the security configuration for a single port."
484           INDEX      { hpSecPtGroupIndex, hpSecPtPortIndex }
485           ::= { hpSecurePortTable 1 }
486
487       HpSecurePortEntry ::=
488           SEQUENCE {
489               hpSecPtGroupIndex              Integer32,
490               hpSecPtPortIndex               Integer32,
491               hpSecPtAddressLimit            Integer32,
492               hpSecPtLearnMode               INTEGER,
493               hpSecPtPreventEavesdrop        INTEGER,
494               hpSecPtAlarmEnable             INTEGER,
495               hpSecPtIntrusionFlag           INTEGER
496           }
497
498       hpSecPtGroupIndex OBJECT-TYPE
499           SYNTAX     Integer32 (1..2147483647)
500           MAX-ACCESS not-accessible
501           STATUS     current
502           DESCRIPTION
503                   "This object identifies the group containing the
504                   port for which this entry contains security
505                   configuration information.  On repeater systems,
506                   this can be used to identify a specific repeater
507                   within a managed stack of repeaters.  On switch
508                   systems, stacked or unstacked, this value is
509                   always one."
510           ::= { hpSecurePortEntry 1 }
511
512       hpSecPtPortIndex  OBJECT-TYPE
513           SYNTAX     Integer32 (1..2147483647)
514           MAX-ACCESS not-accessible
515           STATUS     current
516           DESCRIPTION
517                   "This object identifies the port within the group
518                   for which this entry contains security
519                   configuration information.  On a switch system,
520                   this index corresponds to the ifIndex of the port."
521           ::= { hpSecurePortEntry 2 }
522
523       hpSecPtAddressLimit OBJECT-TYPE
524           SYNTAX     Integer32 (1..32)
525           MAX-ACCESS read-write
526           STATUS     current
527           DESCRIPTION
528                   "This object identifies the maximum number of
529                   MAC addresses learned on this port when the
530                   hpSecPtLearnMode is set to learnFirstN or
531                   learnFirstNConditionally.  Changing the limit
532                   while in these modes clears any addresses for
533                   this port in the hpSecureAuthAddrTable.
534                   This limit does not apply when the learn mode
535                   is set to configureSpecific."
536           ::= { hpSecurePortEntry 3 }
537
538       hpSecPtLearnMode OBJECT-TYPE
539           SYNTAX     INTEGER {
540                          learnContinuous(1),
541                          learnFirstN(2),
542                          learnFirstNConditionally(3),
543                          configureSpecific(4),
544                          learn8021xAuthorized(5),
545                          learnLimitedContinuous(6)
546                      }
547           MAX-ACCESS read-write
548           STATUS     current
549           DESCRIPTION
550                   "This object identifies the learning mode of the port.
551                   The modes are as follows:
552                       LearnContinuous.  The port can learn all new MAC
553                           addresses.  When a new address is learned,
554                           it is stored in a manner such that it can
555                           be retrieved from the hpSecureAuthAddrTable.
556                           Changing the mode to this value clears any
557                           existing addresses for this port in the
558                           hpSecureAuthAddrTable.
559                       learnFirstN.  First N source MAC addresses heard
560                           on this port become the authorized addresses.
561                           N is configured in hpSecPtAddressLimit.
562                           Setting this value initiates learning of up
563                           to N new authorized addresses.  When a new
564                           authorized address is learned, it will be
565                           stored in the hpSecureAuthAddrTable.  When
566                           the table has reached its limit N for this
567                           port, any new source MAC addresses received
568                           on the port constitutes an intrusion.  See
569                           hpSecPtAlarmEnable for possible responses
570                           to the intrusion.  This variable will return
571                           learnFirstNConditionally to a GET operation
572                           after it has been set to this value.
573                       learnFirstNConditionally.  This option will
574                           initiate learning of up to N new authorized
575                           addresses only if the previous hpSecPtLearnMode
576                           was not set to learnFirstN or learnFirstN-
577                           Conditionally.  N is configured in
578                           hpSecPtAddressLimit.
579                       configureSpecific.  The port will not learn any
580                           addresses.  Rather, specific authorized
581                           MAC addresses for this port are explicitly
582                           configured via the hpSecureCfgAddrTable.
583                           These addresses are also stored in the
584                           hpSecureAuthAddrTable.  Any source MAC
585                           address received on this port other than
586                           those configured, constitutes an intrusion.
587                           See hpSecPtAlarmEnable for possible responses.
588                       learn8021xAuthorized.  The port will learn only MAC
589                           address of a client authorized by 802.1X
590                           authenticator.
591                       learnLimitedContinuous.  First N source MAC addresses
592                           heard on this port become the authorized addresses.
593                           N is specified by the hpSecPtAddressLimit
594                           object.  When a new authorized address is learned, it
595                           will be stored in the hpSecureAuthAddrTable.  When
596                           the table has reached its limit N for this port, any
597                           new source MAC addresses received on the port
598                           constitutes an intrusion.   See hpSecPtAlarmEnable
599                           for possible responses.  The authorized addresses in
600                           this mode will age out of the system, therefore the
601                           list of authorized addresses can be dynamic over
602                           time."
603           ::= { hpSecurePortEntry 4 }
604
605       hpSecPtPreventEavesdrop OBJECT-TYPE
606           SYNTAX     INTEGER {
607                          enable(1),
608                          disable(2)
609                      }
610           MAX-ACCESS read-write
611           STATUS     deprecated
612           DESCRIPTION
613                   "If enabled on a switch, outbound unknown unicast
614                   packets will not be forwarded out this port.  If
615                   enabled on a repeater, outbound unknown unicast
616                   packets for this port will be scrambled."
617           ::= { hpSecurePortEntry 5 }
618
619       hpSecPtAlarmEnable OBJECT-TYPE
620           SYNTAX     INTEGER {
621                          disable(1),
622                          sendTrap(2),
623                          sendTrapAndDisablePort(3)
624                      }
625           MAX-ACCESS read-write
626           STATUS     current
627           DESCRIPTION
628                   "This object identifies the action taken when an
629                   intrusion occurs.  See hpSecPtLearnMode for what
630                   constitutes an intrusion.
631                       disable.  No trap is sent and the port
632                           remains enabled.
633                       SendTrap.  If the hpSecPtIntrusionFlag is
634                           set to noIntrusion, the agent will generate
635                           an intrusionTrap.
636                       SendTrapAndDisablePort.  If the hpSecPtIntru-
637                           sionFlag is set to noIntrusion, the agent
638                           generate an intrusionTrap and disable
639                           the port.  This value does not apply to
640                           repeaters."
641           ::= { hpSecurePortEntry 6 }
642
643       hpSecPtIntrusionFlag OBJECT-TYPE
644           SYNTAX     INTEGER {
645                          intrusion(1),
646                          noIntrusion(2)
647                      }
648           MAX-ACCESS read-write
649           STATUS     current
650           DESCRIPTION
651                   "This flag indicates if an intrusion has occured
652                   on this port.  Security-related LED(s) on the
653                   device will blink if any instance of this flag
654                   has the value intrusion.  Setting this flag to
655                   noIntrusion will turn off the appropriate LED(s).
656                   An intrusion will only cause an alarm and an
657                   intrusion log entry if this flag is equal to
658                   noIntrusion.  On a switch, packets causing
659                   intrusions will be not be forwarded."
660           ::= { hpSecurePortEntry 7 }
661
662       hpSecureCfgAddrTable OBJECT-TYPE
663           SYNTAX     SEQUENCE OF HpSecureCfgAddrEntry
664           MAX-ACCESS not-accessible
665           STATUS     current
666           DESCRIPTION
667                   "Table containing multiple configured authorized
668                   addresses per port.  Facilitates security
669                   for ports whose hpSecPtLearnMode is set to
670                   configureSpecific."
671           ::= { hubSecurity 4 }
672
673       hpSecureCfgAddrEntry OBJECT-TYPE
674           SYNTAX     HpSecureCfgAddrEntry
675           MAX-ACCESS not-accessible
676           STATUS     current
677           DESCRIPTION
678                   "An entry in the hpSecureCfgAddrTable, containing
679                   the configured authorized address for a single
680                   port.  Entries are stored in nonvolatile memory
681                   when either the hpSecPtrLearnMode for the port
682                   is changed to configureSpecific, or a new entry
683                   is configured while hpSecPtrLearnMode for the
684                   port is currently set to configureSpecific."
685           INDEX      { hpSecCfgAddrGroupIndex,
686                        hpSecCfgAddrPortIndex,
687                        hpSecCfgAddress}
688           ::= { hpSecureCfgAddrTable 1 }
689
690       HpSecureCfgAddrEntry ::=
691           SEQUENCE {
692               hpSecCfgAddrGroupIndex       Integer32,
693               hpSecCfgAddrPortIndex        Integer32,
694               hpSecCfgAddress              MacAddress,
695               hpSecCfgStatus               RowStatus
696           }
697
698       hpSecCfgAddrGroupIndex OBJECT-TYPE
699           SYNTAX     Integer32 (1..2147483647)
700           MAX-ACCESS not-accessible
701           STATUS     current
702           DESCRIPTION
703                   "This object identifies the group containing the
704                   port for which this entry contains the configured
705                   authorized address.  On repeater systems,
706                   this can be used to identify a specific repeater
707                   within a managed stack of repeaters.  On switch
708                   systems, stacked or unstacked, this value is
709                   always one."
710           ::= { hpSecureCfgAddrEntry 1 }
711
712       hpSecCfgAddrPortIndex  OBJECT-TYPE
713           SYNTAX     Integer32 (1..2147483647)
714           MAX-ACCESS not-accessible
715           STATUS     current
716           DESCRIPTION
717                   "This object identifies the port within the group
718                   for which this entry contains the configured
719                   authorized address.  On a switch, this index
720                   corresponds to the ifIndex of the port."
721           ::= { hpSecureCfgAddrEntry 2 }
722
723       hpSecCfgAddress OBJECT-TYPE
724           SYNTAX     MacAddress
725           MAX-ACCESS not-accessible
726           STATUS     current
727           DESCRIPTION
728                   "A specific authorized MAC address for this port
729                   configured by a management station."
730           ::= { hpSecureCfgAddrEntry 3 }
731
732       hpSecCfgStatus OBJECT-TYPE
733           SYNTAX       RowStatus
734           MAX-ACCESS   read-create
735           STATUS       current
736           DESCRIPTION
737                   "The row status of a hpSecureCfgAddrEntry."
738           ::= { hpSecureCfgAddrEntry 4 }
739
740
741       hpSecureAuthAddrTable OBJECT-TYPE
742           SYNTAX     SEQUENCE OF HpSecureAuthAddrEntry
743           MAX-ACCESS not-accessible
744           STATUS     current
745           DESCRIPTION
746                   "Table containing the authorized addresses for
747                   each port.  An authorized address is an address
748                   learned while the hpSecPtLearnMode for the port
749                   is set to learnContinuous, learnFirstN,
750                   learnLimitedContinuous, or learnFirstNConditionally;
751                   or an address in the hpSecureCfgAddrTable when the
752                   hpSecPtLearnMode for the port is set to configureSpecific.
753                   On a switch, for ports whose hpSecPtLearnMode
754                   is set to learnContinuous or learnLimitedContinuous,
755                   this table may return MAC address information based
756                   on the switch's 802.1d forwarding database."
757           ::= { hubSecurity 5 }
758
759       hpSecureAuthAddrEntry OBJECT-TYPE
760           SYNTAX     HpSecureAuthAddrEntry
761           MAX-ACCESS not-accessible
762           STATUS     current
763           DESCRIPTION
764                   "An entry in the hpSecureAuthAddrTable,
765                   containing the authorized address for a single
766                   port.  Entries are stored in nonvolatile memory
767                   except when the port's hpSecPtLearnMode is set
768                   to learnContinuous or learnLimitedContinuous."
769
770           INDEX      { hpSecAuthAddrGroupIndex,
771                        hpSecAuthAddrPortIndex,
772                        hpSecAuthAddress }
773           ::= { hpSecureAuthAddrTable 1 }
774
775       HpSecureAuthAddrEntry ::=
776           SEQUENCE {
777               hpSecAuthAddrGroupIndex       Integer32,
778               hpSecAuthAddrPortIndex        Integer32,
779               hpSecAuthAddress              MacAddress
780           }
781
782       hpSecAuthAddrGroupIndex OBJECT-TYPE
783           SYNTAX     Integer32 (1..2147483647)
784           MAX-ACCESS not-accessible
785           STATUS     current
786           DESCRIPTION
787                   "This object identifies the group containing the
788                   port for which this entry contains authorized
789                   address information.  On repeater systems,
790                   this can be used to identify a specific repeater
791                   within a managed stack of repeaters.  On switch
792                   systems, stacked or unstacked, this value is
793                   always one."
794           ::= { hpSecureAuthAddrEntry 1 }
795
796       hpSecAuthAddrPortIndex  OBJECT-TYPE
797           SYNTAX     Integer32 (1..2147483647)
798           MAX-ACCESS not-accessible
799           STATUS     current
800           DESCRIPTION
801                   "This object identifies the port within the group
802                   for which this entry contains authorized
803                   address information.  On a switch, this index
804                   corresponds to ifIndex of the port."
805           ::= { hpSecureAuthAddrEntry 2 }
806
807       hpSecAuthAddress OBJECT-TYPE
808           SYNTAX     MacAddress
809           MAX-ACCESS read-only
810           STATUS     current
811           DESCRIPTION
812                   "The MAC address of the station authorized to be
813                   on this port.  See hpSecureAuthAddrTable for
814                   the definition of 'authorized address'."
815           ::= { hpSecureAuthAddrEntry 3 }
816
817
818
819       -- The Generic Repeater backup links group
820
821       hpicfGRpBackupLinks
822           OBJECT IDENTIFIER ::= { hpicfGenericRepeater 2 }
823
824       hpicfBackupLinkNextIndex OBJECT-TYPE
825           SYNTAX     Integer32 (0..65535)
826           MAX-ACCESS read-write
827           STATUS     current
828           DESCRIPTION
829                   "A currently unassigned value of
830                   hpicfBackupLinkIndex.  The value 0 indicates that no
831                   unassigned values are available.
832
833                   In order to cause a non-zero value of this object to
834                   be assigned for use as the hpicfBackupLinkIndex of a
835                   future backup link configuration, it must be
836                   successfully modified by a set operation.  When
837                   modified by a set operation, the new value must
838                   precisely match the value presently held by the
839                   object.  If not, the management protocol set
840                   operation will fail.
841
842                   Immediately after the completion of a successful set
843                   operation, the agent must modify the value of this
844                   object.  The algorithm for modifying the value is
845                   implementation-dependent, and may use a subset of
846                   values within the legal range.  However, the agent
847                   must guarantee that the new value is not assigned to
848                   any in-use value of hpicfBackupLinkIndex.
849
850                   A management station creates a new backup link using
851                   this algorithm:
852
853                      - issue a management protocol retrieval operation
854                        to obtain the value of hpicfBackupLinkNextIndex;
855                        if the retrieved value is zero, a new backup
856                        link cannot be created at this time;
857
858                      - issue a management protocol set operation for
859                        hpicfBackupLinkNextIndex, supplying the same
860                        value as obtained in the previous step;
861
862                      - if the set operation succeeds, use the supplied
863                        value as the hpicfBackupLinkIndex of the new
864                        backup link; if the set operation fails, go back
865                        to the first step and obtain a new value for
866                        hpicfBackupLinkNextIndex;
867
868                      - issue a management protocol set operation to
869                        create an instance of the hpicfBackupLinkStatus
870                        object setting its value to 'createAndGo' or
871                        'createAndWait' (as specified in the description
872                        of the RowStatus textual convention).
873
874                    Note that the set of hpicfBackupLinkNextIndex and
875                    the instance of hpicfBackupLinkStatus may occur in
876                    the same set operation if desired."
877           ::= { hpicfGRpBackupLinks 1 }
878
879       hpicfBackupLinkTable OBJECT-TYPE
880           SYNTAX     SEQUENCE OF HpicfBackupLinkEntry
881           MAX-ACCESS not-accessible
882           STATUS     current
883           DESCRIPTION
884                   "A table of backup link configuration entries.  For
885                   a given backup link, the agent will periodically send
886                   a test packet to the device at the specified address.
887                   If no response is received after a configured number
888                   of test packets are sent, the agent will enable the
889                   backup port and disable the primary port, and will
890                   stop sending periodic test packets.  After the agent
891                   has switched to the backup link, the primary port
892                   will need to explicitly be re-enabled via management
893                   action in order to return to using the primary port.
894
895                   At any time, a management station can examine the
896                   associated instance of the hpicfBackupLinkState
897                   object to determine if the backup port is currently
898                   in use.
899
900                   The backup link algorithm enables and disables the
901                   backup port by modifying the instance of the
902                   rptrPortAdminStatus object corresponding to that
903                   port.  After the backup port has been enabled by the
904                   backup link algorithm, if the primary port is
905                   subsequently enabled via management action, the
906                   backup port will be turned off and the periodic
907                   test packets will resume.
908
909                   When a row of this table is activated, the backup
910                   port will be disabled, the primary port will be
911                   enabled, and the periodic test packets will be sent.
912                   The time between test packets is configurable using
913                   the associated instance of the
914                   hpicfBackupLinkTestTime object.  The number of
915                   failures needed to switch to the backup port is
916                   configurable using the associated instance of the
917                   hpicfBackupLinkConsecFailures object.  The backup
918                   link function can be disabled by setting the relevant
919                   instance of the hpicfBackupLinkStatus object to
920                   either 'notInService' or 'destroy'.
921
922                   Note that the primary port for a backup link must
923                   be mapped to a repeater segment that the agent is
924                   capable of transmitting through.  In addition, a
925                   given port cannot be used in more than one active
926                   backup link at the same time."
927           ::= { hpicfGRpBackupLinks 2 }
928
929       hpicfBackupLinkEntry OBJECT-TYPE
930           SYNTAX     HpicfBackupLinkEntry
931           MAX-ACCESS not-accessible
932           STATUS     current
933           DESCRIPTION
934                   "A row in the table, containing information about a
935                   single backup link."
936           INDEX      { hpicfBackupLinkIndex }
937           ::= { hpicfBackupLinkTable 1 }
938
939       HpicfBackupLinkEntry ::=
940           SEQUENCE {
941               hpicfBackupLinkIndex            Integer32,
942               hpicfBackupLinkPrimaryGroup     Integer32,
943               hpicfBackupLinkPrimaryPort      Integer32,
944               hpicfBackupLinkBackupGroup      Integer32,
945               hpicfBackupLinkBackupPort       Integer32,
946               hpicfBackupLinkAddress          MacAddress,
947               hpicfBackupLinkTestTime         Integer32,
948               hpicfBackupLinkConsecFailures   Integer32,
949               hpicfBackupLinkState            INTEGER,
950               hpicfBackupLinkFailEventIndex   Integer32,
951               hpicfBackupLinkStatus           RowStatus
952           }
953
954       hpicfBackupLinkIndex OBJECT-TYPE
955           SYNTAX     Integer32 (1..65535)
956           MAX-ACCESS not-accessible
957           STATUS     current
958           DESCRIPTION
959                   "The value of this object uniquely identifies this
960                   backup link."
961           ::= { hpicfBackupLinkEntry 1 }
962
963       hpicfBackupLinkPrimaryGroup OBJECT-TYPE
964           SYNTAX     Integer32 (1..2147483647)
965           MAX-ACCESS read-create
966           STATUS     current
967           DESCRIPTION
968                   "The group containing the primary port for this
969                   backup link."
970           ::= { hpicfBackupLinkEntry 2 }
971
972       hpicfBackupLinkPrimaryPort OBJECT-TYPE
973           SYNTAX     Integer32 (1..2147483647)
974           MAX-ACCESS read-create
975           STATUS     current
976           DESCRIPTION
977                   "The port number within the group of the primary port
978                   for this backup link."
979           ::= { hpicfBackupLinkEntry 3 }
980
981       hpicfBackupLinkBackupGroup OBJECT-TYPE
982           SYNTAX     Integer32 (1..2147483647)
983           MAX-ACCESS read-create
984           STATUS     current
985           DESCRIPTION
986                   "The group containing the backup port for this
987                   backup link."
988           ::= { hpicfBackupLinkEntry 4 }
989
990       hpicfBackupLinkBackupPort OBJECT-TYPE
991           SYNTAX     Integer32 (1..2147483647)
992           MAX-ACCESS read-create
993           STATUS     current
994           DESCRIPTION
995                   "The port number within the group of the backup port
996                   for this backup link."
997           ::= { hpicfBackupLinkEntry 5 }
998
999       hpicfBackupLinkAddress OBJECT-TYPE
1000           SYNTAX     MacAddress
1001           MAX-ACCESS read-create
1002           STATUS     current
1003           DESCRIPTION
1004                   "The MAC address of the device to which periodic
1005                   test packets are sent in order to determine if the
1006                   primary link is operational."
1007           ::= { hpicfBackupLinkEntry 6 }
1008
1009       hpicfBackupLinkTestTime OBJECT-TYPE
1010           SYNTAX     Integer32 (1..15)
1011           MAX-ACCESS read-create
1012           STATUS     current
1013           DESCRIPTION
1014                   "The frequency, in seconds, between sending periodic
1015                   test packets.  The test packet response timeout is
1016                   fixed at 500ms."
1017           DEFVAL     { 1 }
1018           ::= { hpicfBackupLinkEntry 7 }
1019
1020       hpicfBackupLinkConsecFailures OBJECT-TYPE
1021           SYNTAX     Integer32 (1..16)
1022           MAX-ACCESS read-create
1023           STATUS     current
1024           DESCRIPTION
1025                   "The number of consecutive test packet failures which
1026                   will cause the agent to switch to the backup port
1027                   (i.e., backup port turned on, primary port turned
1028                   off).  A value of one is generally not recommended
1029                   and will cause the backup link to be enabled upon
1030                   the first failure."
1031           DEFVAL     { 2 }
1032           ::= { hpicfBackupLinkEntry 8 }
1033
1034       hpicfBackupLinkState OBJECT-TYPE
1035           SYNTAX     INTEGER {
1036                          notActive(1),
1037                          usingPrimary(2),
1038                          usingBackup(3)
1039                      }
1040           MAX-ACCESS read-only
1041           STATUS     current
1042           DESCRIPTION
1043                   "The current state of this backup link.  One of the
1044                   following values:
1045
1046                       notActive    - backup link not running because
1047                                      this row has not yet been made
1048                                      active
1049                       usingPrimary - backup link is running and using
1050                                      the primary port
1051                       usingBackup  - backup link test has failed; the
1052                                      primary port has been disabled
1053                                      and the backup port has been
1054                                      enabled"
1055           ::= { hpicfBackupLinkEntry 9 }
1056
1057       hpicfBackupLinkFailEventIndex OBJECT-TYPE
1058           SYNTAX     Integer32 (0..65535)
1059           MAX-ACCESS read-create
1060           STATUS     current
1061           DESCRIPTION
1062                   "The index of the eventEntry in the RMON MIB that
1063                   will be triggered whenever the value of
1064                   hpicfBackupLinkState changes from 'usingPrimary' to
1065                   'usingBackup'.  The eventEntry identified by a
1066                   particular value of this index is the same as
1067                   identified by the same value of the eventIndex
1068                   object.  If there is no corresponding entry in the
1069                   eventTable, then no association exists.  In
1070                   particular, if this value is zero, no associated
1071                   event will be generated, as zero is not a valid
1072                   event index."
1073           ::= { hpicfBackupLinkEntry 10 }
1074
1075       hpicfBackupLinkStatus OBJECT-TYPE
1076           SYNTAX     RowStatus
1077           MAX-ACCESS read-create
1078           STATUS     current
1079           DESCRIPTION
1080                   "The status of this entry.  This object may not be
1081                   set to 'active' unless the corresponding instance of
1082                   hpicfBackupLinkAddress has been set to a valid
1083                   unicast address, the corresponding instances of
1084                   hpicfBackupLinkPrimaryGroup,
1085                   hpicfBackupLinkPrimaryPort,
1086                   hpicfBackupLinkBackupGroup, and
1087                   hpicfBackupLinkBackupPort have been configured to
1088                   refer to two existing ports and that those ports are
1089                   not used in any other active backup link
1090                   configuration, and the primary port is mapped to a
1091                   repeater segment which the agent is capable of
1092                   transmitting through."
1093           ::= { hpicfBackupLinkEntry 11 }
1094
1095
1096       -- The generic repeater port mapping group
1097
1098       hpGRpPortMapping
1099           OBJECT IDENTIFIER ::= { hpicfGenericRepeater 3 }
1100
1101       hpGRpPMSegmentTable OBJECT-TYPE
1102           SYNTAX     SEQUENCE OF HpGRpPMSegmentEntry
1103           MAX-ACCESS not-accessible
1104           STATUS     current
1105           DESCRIPTION
1106                   "A table for configuring segment-to-repeater mapping
1107                   for repeater segments in this managed system."
1108           ::= { hpGRpPortMapping 1 }
1109
1110       hpGRpPMSegmentEntry OBJECT-TYPE
1111           SYNTAX     HpGRpPMSegmentEntry
1112           MAX-ACCESS not-accessible
1113           STATUS     current
1114           DESCRIPTION
1115                   "An entry in the table, containing mapping
1116                   information about a single repeater segment."
1117           INDEX      { hpGRpPMSegmentIndex }
1118           ::= { hpGRpPMSegmentTable 1 }
1119
1120       HpGRpPMSegmentEntry ::=
1121           SEQUENCE {
1122               hpGRpPMSegmentIndex             Integer32,
1123               hpGRpPMCurrentRptrIndex         Integer32
1124           }
1125
1126       hpGRpPMSegmentIndex OBJECT-TYPE
1127           SYNTAX     Integer32 (1..2147483647)
1128           MAX-ACCESS not-accessible
1129           STATUS     current
1130           DESCRIPTION
1131                   "The value of an instance of this object uniquely
1132                   identifies a physical repeater segment in this
1133                   managed system.  The value of an instance of this
1134                   object will be equal to the instance of the Entity
1135                   MIB's entPhysicalIndex for the entry in the
1136                   entPhysicalTable that represents this segment."
1137           ::= { hpGRpPMSegmentEntry 1 }
1138
1139       hpGRpPMCurrentRptrIndex OBJECT-TYPE
1140           SYNTAX     Integer32 (1..2147483647)
1141           MAX-ACCESS read-write
1142           STATUS     current
1143           DESCRIPTION
1144                   "The index of the repeater that this segment is
1145                   currently connected to.  Changing this value has the
1146                   effect of moving all ports on this segment to a
1147                   different repeater.  The hpGRpPMSegAllowedRptrTable
1148                   should be consulted to determine which repeaters
1149                   this segment can be connected to."
1150           ::= { hpGRpPMSegmentEntry 3 }
1151
1152
1153       hpGRpPMSegAllowedRptrTable OBJECT-TYPE
1154           SYNTAX     SEQUENCE OF HpGRpPMSegAllowedRptrEntry
1155           MAX-ACCESS not-accessible
1156           STATUS     current
1157           DESCRIPTION
1158                   "This table is used to inform a management
1159                   application about which repeaters a physical segment
1160                   is able to be connected to.  There is one row in this
1161                   table for each allowable segment-to-repeater
1162                   connection."
1163           ::= { hpGRpPortMapping 2 }
1164
1165       hpGRpPMSegAllowedRptrEntry OBJECT-TYPE
1166           SYNTAX     HpGRpPMSegAllowedRptrEntry
1167           MAX-ACCESS not-accessible
1168           STATUS     current
1169           DESCRIPTION
1170                   "A row in the table, containing a single allowable
1171                   segment-to-repeater connection.  The presence of a
1172                   row indicates that the segment identified by
1173                   hpGRpPMSegmentIndex can be mapped to the repeater
1174                   identified by hpGRpPMSegAllowedRptrIndex."
1175           INDEX      { hpGRpPMSegmentIndex,
1176                        hpGRpPMSegAllowedRptrIndex }
1177           ::= { hpGRpPMSegAllowedRptrTable 1 }
1178
1179       HpGRpPMSegAllowedRptrEntry ::=
1180           SEQUENCE {
1181               hpGRpPMSegAllowedRptrIndex      Integer32
1182           }
1183
1184       hpGRpPMSegAllowedRptrIndex OBJECT-TYPE
1185           SYNTAX     Integer32 (1..2147483647)
1186           MAX-ACCESS read-only
1187           STATUS     current
1188           DESCRIPTION
1189                   "The repeater index that identifies a repeater that
1190                   this segment is able to be connected to."
1191           ::= { hpGRpPMSegAllowedRptrEntry 1 }
1192
1193
1194       hpGRpPMPortTable OBJECT-TYPE
1195           SYNTAX     SEQUENCE OF HpGRpPMPortEntry
1196           MAX-ACCESS not-accessible
1197           STATUS     current
1198           DESCRIPTION
1199                   "A table for configuring port-to-repeater mapping
1200                   for repeater ports in this managed system."
1201           ::= { hpGRpPortMapping 3 }
1202
1203       hpGRpPMPortEntry OBJECT-TYPE
1204           SYNTAX     HpGRpPMPortEntry
1205           MAX-ACCESS not-accessible
1206           STATUS     current
1207           DESCRIPTION
1208                   "An entry in the table, containing mapping
1209                   information about a single repeater port."
1210           INDEX      { hpGRpPMPortGroupIndex, hpGRpPMPortIndex }
1211           ::= { hpGRpPMPortTable 1 }
1212
1213       HpGRpPMPortEntry ::=
1214           SEQUENCE {
1215               hpGRpPMPortGroupIndex           Integer32,
1216               hpGRpPMPortIndex                Integer32,
1217               hpGRpPMPortEntPhysicalIndex     Integer32,
1218               hpGRpPMPortCurrentRptrIndex     Integer32
1219           }
1220
1221       hpGRpPMPortGroupIndex OBJECT-TYPE
1222           SYNTAX     Integer32 (1..2147483647)
1223           MAX-ACCESS not-accessible
1224           STATUS     current
1225           DESCRIPTION
1226                   "The group containing the port for which this entry
1227                   contains mapping information."
1228           ::= { hpGRpPMPortEntry 1 }
1229
1230       hpGRpPMPortIndex OBJECT-TYPE
1231           SYNTAX     Integer32 (1..2147483647)
1232           MAX-ACCESS not-accessible
1233           STATUS     current
1234           DESCRIPTION
1235                   "The port within the group for which this entry
1236                   contains mapping information."
1237           ::= { hpGRpPMPortEntry 2 }
1238
1239       hpGRpPMPortEntPhysicalIndex OBJECT-TYPE
1240           SYNTAX     Integer32 (1..2147483647)
1241           MAX-ACCESS read-only
1242           STATUS     current
1243           DESCRIPTION
1244                   "This object indicates which entry in the Entity
1245                   MIB's entPhysicalTable represents this port.  The
1246                   entPhysicalEntry identified by this value is the
1247                   same entry identified by the same value of the
1248                   entPhysicalIndex object."
1249           ::= { hpGRpPMPortEntry 3 }
1250
1251       hpGRpPMPortCurrentRptrIndex OBJECT-TYPE
1252           SYNTAX     Integer32 (0..2147483647)
1253           MAX-ACCESS read-write
1254           STATUS     current
1255           DESCRIPTION
1256                   "The index of the repeater that this port is
1257                   currently mapped to.  Changing this value has the
1258                   effect of moving this port to a different repeater.
1259                   The hpGRpPMPortAllowedRptrTable should be consulted
1260                   to determine which repeaters this port can be mapped
1261                   to.  A value of zero indicates that this port is
1262                   currently not a member of any repeater."
1263           ::= { hpGRpPMPortEntry 4 }
1264
1265
1266       hpGRpPMPortAllowedRptrTable OBJECT-TYPE
1267           SYNTAX     SEQUENCE OF HpGRpPMPortAllowedRptrEntry
1268           MAX-ACCESS not-accessible
1269           STATUS     current
1270           DESCRIPTION
1271                   "This table is used to inform a management
1272                   application about which repeaters a logical port is
1273                   able to be mapped to.  There is one row in this table
1274                   for each allowable port to repeater mapping."
1275           ::= { hpGRpPortMapping 4 }
1276
1277       hpGRpPMPortAllowedRptrEntry OBJECT-TYPE
1278           SYNTAX     HpGRpPMPortAllowedRptrEntry
1279           MAX-ACCESS not-accessible
1280           STATUS     current
1281           DESCRIPTION
1282                   "A row in the table, containing a single allowable
1283                   port to repeater mapping.  The presence of a row
1284                   indicates that the port identified by
1285                   hpGRpPMPortGroupIndex, hpGRpPMPortIndex can be
1286                   mapped to the repeater identified by
1287                   hpGRpPMPortAllowedRptrIndex."
1288           INDEX      { hpGRpPMPortGroupIndex, hpGRpPMPortIndex,
1289                        hpGRpPMPortAllowedRptrIndex }
1290           ::= { hpGRpPMPortAllowedRptrTable 1 }
1291
1292       HpGRpPMPortAllowedRptrEntry ::=
1293           SEQUENCE {
1294               hpGRpPMPortAllowedRptrIndex     Integer32
1295           }
1296
1297       hpGRpPMPortAllowedRptrIndex OBJECT-TYPE
1298           SYNTAX     Integer32 (1..2147483647)
1299           MAX-ACCESS read-only
1300           STATUS     current
1301           DESCRIPTION
1302                   "The repeater index that identifies a repeater that
1303                   this port is able to be mapped to."
1304           ::= { hpGRpPMPortAllowedRptrEntry 1 }
1305
1306
1307       -- The generic repeater load balancing group
1308
1309       hpGRpLoadBalancing
1310           OBJECT IDENTIFIER ::= { hpicfGenericRepeater 4 }
1311
1312       hpGRpPortMapAutoConfigEnable OBJECT-TYPE
1313           SYNTAX     INTEGER {
1314                          enabled(1),
1315                          disabled(2)
1316                      }
1317           MAX-ACCESS read-write
1318           STATUS     current
1319           DESCRIPTION
1320                   "If this object has the value 'enabled', when a
1321                   switch is discovered in the stack, the repeater
1322                   ports will be evenly distributed across the repeater
1323                   segments if they had not previously been assigned
1324                   to segments (in other words, if they are in their
1325                   default state).  If this object has the value
1326                   'disabled', this automatic distribution of ports
1327                   will not occur."
1328           ::= { hpGRpLoadBalancing 1 }
1329
1330       hpGRpLoadBalanceNow OBJECT-TYPE
1331           SYNTAX     INTEGER {
1332                          cantUndo(1),
1333                          balancing(2),
1334                          completed(3),
1335                          undoLast(4)
1336                      }
1337           MAX-ACCESS read-write
1338           STATUS     current
1339           DESCRIPTION
1340                   "Setting this object to 'balancing' will cause the
1341                   agent to distribute ports in the stack across the
1342                   repeater segments, attempting to balance the
1343                   traffic load on each segment.  When the agent has
1344                   finished the load balancing, it will set the value
1345                   of this object to 'completed'.  Setting this object
1346                   to 'undoLast' will cause the agent to return all of
1347                   the ports to the segment they were on before the
1348                   last load balancing.  This object will have the
1349                   value of 'cantUndo' if there has been no load
1350                   balancing since the last agent reset or if the last
1351                   load balancing has already been undone.  This object
1352                   can only be set to 'undoLast' when its current value
1353                   is 'completed'."
1354           ::= { hpGRpLoadBalancing 2 }
1355
1356       hpGRpLastLoadBalanceTime OBJECT-TYPE
1357           SYNTAX     TimeStamp
1358           MAX-ACCESS read-only
1359           STATUS     current
1360           DESCRIPTION
1361                   "This object contains the value of sysUpTime for
1362                   the last time the hpGRPLoadBalanceNow object was
1363                   set to 'balancing'.  If load balancing has not been
1364                   performed since the last agent reset, this object
1365                   will have the value 0."
1366           ::= { hpGRpLoadBalancing 3 }
1367
1368
1369       -- Objects for configuring internal and external switches
1370       -- for switching between repeater segments in a repeater
1371       -- system.
1372
1373       hpicfGRpSwitchConfig
1374           OBJECT IDENTIFIER ::= { hpicfGenericRepeater 5 }
1375
1376       hpicfGRpSwitchTable OBJECT-TYPE
1377           SYNTAX     SEQUENCE OF HpicfGRpSwitchEntry
1378           MAX-ACCESS not-accessible
1379           STATUS     current
1380           DESCRIPTION
1381                   "A table of switches, both internal and external,
1382                   connected to ports in this repeater system.
1383                   Typically, internal switches are added by the agent
1384                   and cannot be removed by a management operation.
1385                   External switches may be added or removed by
1386                   management operations using the hpicfGRpSwitchStatus
1387                   object."
1388           ::= { hpicfGRpSwitchConfig 1 }
1389
1390       hpicfGRpSwitchEntry OBJECT-TYPE
1391           SYNTAX     HpicfGRpSwitchEntry
1392           MAX-ACCESS not-accessible
1393           STATUS     current
1394           DESCRIPTION
1395                   "An entry in the table, representing a single
1396                   attached switch."
1397           INDEX      { hpicfGRpSwitchIndex }
1398           ::= { hpicfGRpSwitchTable 1 }
1399
1400       HpicfGRpSwitchEntry ::=
1401           SEQUENCE {
1402               hpicfGRpSwitchIndex             Integer32,
1403               hpicfGRpSwitchType              INTEGER,
1404               hpicfGRpSwitchEntPhysicalIndex  Integer32,
1405               hpicfGRpSwitchLinkCount         Integer32,
1406               hpicfGRpSwitchStatus            RowStatus
1407           }
1408
1409       hpicfGRpSwitchIndex OBJECT-TYPE
1410           SYNTAX     Integer32 (1..31)
1411           MAX-ACCESS not-accessible
1412           STATUS     current
1413           DESCRIPTION
1414                   "An index used to uniquely identify this switch."
1415           ::= { hpicfGRpSwitchEntry 1 }
1416
1417       hpicfGRpSwitchType OBJECT-TYPE
1418           SYNTAX     INTEGER {
1419                          internal(1),
1420                          external(2)
1421                      }
1422           MAX-ACCESS read-only
1423           STATUS     current
1424           DESCRIPTION
1425                   "This object indicates whether this switch is an
1426                   internal switch card or a switch external to the
1427                   repeater system.  This object will always be equal
1428                   to 'external' for rows that are created using
1429                   hpicfGRpSwitchStatus.  For internal switches, the
1430                   type of internal switch can be determined by
1431                   examining the relevant instance of the
1432                   entPhysicalType object."
1433           ::= { hpicfGRpSwitchEntry 2 }
1434
1435       hpicfGRpSwitchEntPhysicalIndex OBJECT-TYPE
1436           SYNTAX     Integer32 (0..2147483647)
1437           MAX-ACCESS read-only
1438           STATUS     current
1439           DESCRIPTION
1440                   "For an internal switch, this object is the index
1441                   in the entPhysicalTable for the internal switch
1442                   card.  For an external switch, the value of this
1443                   object will be zero."
1444           ::= { hpicfGRpSwitchEntry 3 }
1445
1446       hpicfGRpSwitchLinkCount OBJECT-TYPE
1447           SYNTAX     Integer32 (0..255)
1448           MAX-ACCESS read-create
1449           STATUS     current
1450           DESCRIPTION
1451                   "The number of links from this switch's ports to
1452                   repeater ports in this repeater system.  For internal
1453                   switches, this object cannot be modified by a network
1454                   management operation.  For an external switch, when
1455                   this object is set, a number of rows will be added to
1456                   the hpicfGRpSwitchLinkTable equal to the value of
1457                   this object.  The values of hpicfGRpSwitchLinkIndex
1458                   will be numbered from 1 to the value of this object.
1459
1460                   An instance of this object may not be modified if
1461                   the corresponding instance of the
1462                   hpicfGRpSwitchStatus object would be equal to
1463                   'active' both before and after the modification
1464                   attempt."
1465           ::= { hpicfGRpSwitchEntry 4 }
1466
1467       hpicfGRpSwitchStatus OBJECT-TYPE
1468           SYNTAX     RowStatus
1469           MAX-ACCESS read-create
1470           STATUS     current
1471           DESCRIPTION
1472                   "The status of this hpicfGRpSwitchEntry.
1473
1474                   An entry may not exist in the active state unless
1475                   the associated instance of the
1476                   hpicfGRpSwitchLinkCount has been set to a non-zero
1477                   value, and all associated instances of the
1478                   hpicfGRpSwitchLinkRptrGroup and
1479                   hpicfGRpSwitchLinkRptrPort objects have been set to
1480                   non-zero values.
1481
1482                   If this object is set to 'destroy', all associated
1483                   entries in the hpicfGRpSwitchLinkTable shall be
1484                   deleted."
1485           ::= { hpicfGRpSwitchEntry 5 }
1486
1487
1488       hpicfGRpSwitchLinkTable OBJECT-TYPE
1489           SYNTAX     SEQUENCE OF HpicfGRpSwitchLinkEntry
1490           MAX-ACCESS not-accessible
1491           STATUS     current
1492           DESCRIPTION
1493                   "A table of links to switch ports for both internal
1494                   and external switches that are connected to repeater
1495                   ports in this repeater system."
1496           ::= { hpicfGRpSwitchConfig 2 }
1497
1498       hpicfGRpSwitchLinkEntry OBJECT-TYPE
1499           SYNTAX     HpicfGRpSwitchLinkEntry
1500           MAX-ACCESS not-accessible
1501           STATUS     current
1502           DESCRIPTION
1503                   "An entry in the table, representing a single link
1504                   to a switch port."
1505           INDEX      { hpicfGRpSwitchIndex,
1506                        hpicfGRpSwitchLinkIndex }
1507           ::= { hpicfGRpSwitchLinkTable 1 }
1508
1509       HpicfGRpSwitchLinkEntry ::=
1510           SEQUENCE {
1511               hpicfGRpSwitchLinkIndex         Integer32,
1512               hpicfGRpSwitchLinkRptrGroup     Integer32,
1513               hpicfGRpSwitchLinkRptrPort      Integer32,
1514               hpicfGRpSwitchLinkState         INTEGER
1515           }
1516
1517       hpicfGRpSwitchLinkIndex OBJECT-TYPE
1518           SYNTAX     Integer32 (1..255)
1519           MAX-ACCESS not-accessible
1520           STATUS     current
1521           DESCRIPTION
1522                   "An identifier that uniquely identifies this switch
1523                   link among all of the links associated with this
1524                   switch.  The values of this object are numbered
1525                   consecutively from 1 to the value of the instance
1526                   of the hpicfGRpSwitchLinkCount associated with this
1527                   switch."
1528           ::= { hpicfGRpSwitchLinkEntry 1 }
1529
1530       hpicfGRpSwitchLinkRptrGroup OBJECT-TYPE
1531           SYNTAX     Integer32 (0..2147483647)
1532           MAX-ACCESS read-write
1533           STATUS     current
1534           DESCRIPTION
1535                   "The group containing the repeater port to which this
1536                   switch link is attached.  For internal switches, this
1537                   object may not be modified by a network management
1538                   operation.  For external switches, an instance of
1539                   this object will be created with the value of zero.
1540                   It must be modified to a non-zero value corresponding
1541                   to a known repeater group index before the instance
1542                   of the hpicfGRpSwitchStatus object associated with
1543                   this switch can be set to 'active'.
1544
1545                   An instance of this object may not be modified if
1546                   the instance of the hpicfGRpSwitchStatus object
1547                   associated with this switch would be equal to
1548                   'active' both before and after the modification
1549                   attempt."
1550           ::= { hpicfGRpSwitchLinkEntry 2 }
1551
1552       hpicfGRpSwitchLinkRptrPort OBJECT-TYPE
1553           SYNTAX     Integer32 (0..2147483647)
1554           MAX-ACCESS read-write
1555           STATUS     current
1556           DESCRIPTION
1557                   "The repeater port within the group to which this
1558                   switch link is attached.  For internal switches, this
1559                   object may not be modified by a network management
1560                   operation.  For external switches, an instance of
1561                   this object will be created with the value of zero.
1562                   It must be modified to a non-zero value corresponding
1563                   to a known repeater port index before the instance
1564                   of the hpicfGRpSwitchStatus object associated with
1565                   this switch can be set to 'active'.
1566
1567                   An instance of this object may not be modified if
1568                   the instance of the hpicfGRpSwitchStatus object
1569                   associated with this switch would be equal to
1570                   'active' both before and after the modification
1571                   attempt."
1572           ::= { hpicfGRpSwitchLinkEntry 3 }
1573
1574       hpicfGRpSwitchLinkState OBJECT-TYPE
1575           SYNTAX     INTEGER {
1576                          active(1),
1577                          redundant(2)
1578                      }
1579           MAX-ACCESS read-write
1580           STATUS     current
1581           DESCRIPTION
1582                   "This object indicates whether this switch link is
1583                   enabled ('active') or disabled ('redundant') due to
1584                   one of the following:
1585
1586                       - There are more links to this switch than there
1587                         are repeater segments.
1588                       - The agent detected a switching loop.
1589                       - The link is intended as a backup connection for
1590                         other links on this switch.
1591
1592                   There can only be one active link to the switch from
1593                   each repeater segment, otherwise you will have a
1594                   switching loop.  Therefore, if more than one switch
1595                   link is connected to repeater ports on the same
1596                   repeater segment, only one of them may have the value
1597                   'active'.  All of the others must have the value
1598                   'redundant."
1599           ::= { hpicfGRpSwitchLinkEntry 4 }
1600
1601
1602       hpicfGRpCurrentPrimarySwitch OBJECT-TYPE
1603           SYNTAX     Integer32 (0..31)
1604           MAX-ACCESS read-only
1605           STATUS     current
1606           DESCRIPTION
1607                  "The hpicfGRpSwitchIndex of the switch that is
1608                  currently the primary switch for this stack.  The
1609                  automatic port-to-segment distribution feature will
1610                  make decisions based on which switch is the primary
1611                  switch.  A value of 0 indicates that there are no
1612                  internal switches in the system, and no external
1613                  switches have been configured."
1614           ::= { hpicfGRpSwitchConfig 3 }
1615
1616       hpicfGRpDesiredPrimarySwitch OBJECT-TYPE
1617           SYNTAX     Integer32 (0..31)
1618           MAX-ACCESS read-write
1619           STATUS     current
1620           DESCRIPTION
1621                  "The hpicfGRpSwitchIndex of the switch that the
1622                  network administrator wants to be the primary switch
1623                  for this stack.  If the value of this object is zero,
1624                  the agent will select the primary switch.  Note that
1625                  the agent may choose to use a different switch as the
1626                  primary switch if it is unable to locate the switch
1627                  identified by this object."
1628           ::= { hpicfGRpSwitchConfig 4 }
1629
1630
1631       -- Objects for configuring an internal bridge for
1632       -- bridging between repeater segments in a repeater
1633       -- system.
1634
1635       hpicfGRpBridge
1636           OBJECT IDENTIFIER ::= { hpicfGenericRepeater 6 }
1637
1638       hpGRpBridgeAdminStatus OBJECT-TYPE
1639           SYNTAX     INTEGER {
1640                          enable(1),
1641                          disable(2)
1642                      }
1643           MAX-ACCESS read-write
1644           STATUS     current
1645           DESCRIPTION
1646                   ""
1647           ::= { hpicfGRpBridge 1 }
1648
1649
1650       -- Generic repeater notifications
1651
1652       hpicfIntrusionTrap NOTIFICATION-TYPE
1653           OBJECTS    { hubIntruderGroup, hubIntruderPort,
1654                        hubIntruderAddress, hubIntruderType,
1655                        hubIntruderTrainingViolation  }
1656           STATUS     current
1657           DESCRIPTION
1658                   "The hpicfIntrusionTrap signifies that a port
1659                   security violation has been detected on a port which
1660                   has the hubSecPtAlarmEnable flag set to 'enabled'.
1661                   or hpSecPtrIntrusionResponse set to 'SendTrap'
1662                   or 'SendTrapAndDisablePort'.
1663                   hubIntruderGroup identifies the group containing the
1664                   port on which this intrusion occurred.
1665                   hubIntruderPort identifies the port within the group
1666                   on which this intrusion occurred.  hubIntruderAddress
1667                   contains the souce MAC address of the intruder.
1668                   hubIntruderType identifies the type of violation that
1669                   occured: address, training, or both.  If the
1670                   violation is of type 'training', the
1671                   hubIntruderTrainingViolation object will indicate
1672                   additional information on the type of violation."
1673           ::= { hpicfGenRptrTrapsPrefix 1 }
1674
1675       hpicfBackupLinkTrap NOTIFICATION-TYPE
1676           OBJECTS    { hpicfBackupLinkState }
1677           STATUS     current
1678           DESCRIPTION
1679                   "The hpicfBackupLinkTrap signifies that the primary
1680                   link for a backup link configuration has failed, and
1681                   the agent has switched over to using the backup link.
1682                   The instance of the hpicfBackupLinkState for the
1683                   backup link configuration that experienced the
1684                   primary link failure is included in the trap."
1685           ::= { hpicfGenRptrTrapsPrefix 2 }
1686
1687
1688       -- conformance information
1689
1690       hpicfGenRptrConformance
1691           OBJECT IDENTIFIER ::= { hpicfGenRptrMib 1 }
1692
1693       hpicfGenRptrCompliances
1694           OBJECT IDENTIFIER ::= { hpicfGenRptrConformance 1 }
1695       hpicfGenRptrGroups
1696           OBJECT IDENTIFIER ::= { hpicfGenRptrConformance 2 }
1697
1698
1699       -- compliance statements
1700
1701       hpicfHubSecurityCompliance MODULE-COMPLIANCE
1702           STATUS     deprecated
1703           DESCRIPTION
1704                   "********* THIS COMPLIANCE IS DEPRECATED *********
1705
1706                   The compliance statement for agents implementing
1707                   per-port security in a single-repeater 802.3
1708                   repeater system."
1709           MODULE
1710               MANDATORY-GROUPS { hpicfHubSecurityGroup }
1711
1712           ::= { hpicfGenRptrCompliances 1 }
1713
1714       hpicfGenRptrBasicCompliance MODULE-COMPLIANCE
1715           STATUS     deprecated
1716           DESCRIPTION
1717                   "********* THIS COMPLIANCE IS DEPRECATED *********
1718
1719                   The compliance statement for agents implementing
1720                   management for a single repeater."
1721           MODULE
1722               MANDATORY-GROUPS { hpicfGenRptrBasicGroup }
1723
1724               GROUP      hpicfGenRptrSecPtGroup
1725               DESCRIPTION
1726                       "This group should be implemented for devices
1727                       that support per-port security."
1728
1729               GROUP      hpicfGenRptrSecNotifyGroup
1730               DESCRIPTION
1731                       "This group should be implemented for devices
1732                       that support per-port security."
1733
1734               OBJECT     hubSecPtPreventEavesdrop
1735               MIN-ACCESS read-only
1736               DESCRIPTION
1737                       "100VG hubs implement this object as read-only,
1738                       since eavesdrop prevention is controlled by
1739                       whether or not a port is allowed to train as
1740                       promiscuous."
1741
1742           ::= { hpicfGenRptrCompliances 2 }
1743
1744       hpicfGenRptrSecurityCompliance MODULE-COMPLIANCE
1745           STATUS     deprecated
1746           DESCRIPTION
1747                   "********* THIS COMPLIANCE IS DEPRECATED *********
1748
1749                   The compliance statement for AdvanceStack 100VG
1750                   slaves implementing security."
1751           MODULE
1752               MANDATORY-GROUPS { hpicfGenRptrSecPtGroup,
1753                                  hpicfGenRptrSecNotifyGroup }
1754
1755               OBJECT     hubSecPtPreventEavesdrop
1756               MIN-ACCESS read-only
1757               DESCRIPTION
1758                       "100VG hubs implement this object as read-only,
1759                       since eavesdrop prevention is controlled by
1760                       whether or not a port is allowed to train as
1761                       promiscuous."
1762
1763           ::= { hpicfGenRptrCompliances 3 }
1764
1765       hpicfGenRptrCompliance MODULE-COMPLIANCE
1766           STATUS     deprecated
1767           DESCRIPTION
1768                   "********* THIS COMPLIANCE IS DEPRECATED *********
1769
1770                   The compliance statement for HP managed repeater
1771                   systems."
1772           MODULE
1773               MANDATORY-GROUPS { hpicfGenRptrBasicGroup,
1774                                  hpicfGenRptrInfoGroup }
1775
1776               GROUP      hpicfGenRptrSecPtGroup
1777               DESCRIPTION
1778                       "This group should be implemented for devices
1779                       that support per-port security."
1780
1781               GROUP      hpicfGenRptrSecNotifyGroup
1782               DESCRIPTION
1783                       "This group should be implemented for devices
1784                       that support per-port security."
1785
1786               GROUP      hpicfGenRptrBkpLinkGroup
1787               DESCRIPTION
1788                       "This group should be implemented for devices
1789                       that support backup link functionality."
1790
1791               GROUP      hpicfGenRptrBkpLinkNotifyGroup
1792               DESCRIPTION
1793                       "This group should be implemented for devices
1794                       that support backup link functionality."
1795
1796               GROUP      hpicfGenRptrPortMappingGroup
1797               DESCRIPTION
1798                       "This group should be implemented for devices
1799                       that support moving segments or ports between
1800                       logical repeaters."
1801
1802               GROUP      hpicfGenRptrLoadBalanceGroup
1803               DESCRIPTION
1804                       "This group should be implemented for devices
1805                       that have multiple repeater segments and an
1806                       internal switch card and that support load
1807                       balancing between segments."
1808
1809               OBJECT     hubSecPtPreventEavesdrop
1810               MIN-ACCESS read-only
1811               DESCRIPTION
1812                       "100VG hubs implement this object as read-only,
1813                       since eavesdrop prevention is controlled by
1814                       whether or not a port is allowed to train as
1815                       promiscuous."
1816
1817           ::= { hpicfGenRptrCompliances 4 }
1818
1819       hpicfGenRptrCompliance2 MODULE-COMPLIANCE
1820           STATUS     current
1821           DESCRIPTION
1822                   "The compliance statement for HP managed repeater
1823                   systems."
1824           MODULE
1825               MANDATORY-GROUPS { hpicfGenRptrBasicGroup,
1826                                  hpicfGenRptrInfoGroup }
1827
1828               GROUP      hpicfGenRptrSecPtGroup
1829               DESCRIPTION
1830                       "This group should be implemented for devices
1831                       that support per-port security."
1832
1833               GROUP      hpicfGenRptrSecNotifyGroup
1834               DESCRIPTION
1835                       "This group should be implemented for devices
1836                       that support per-port security."
1837
1838               GROUP      hpicfGenRptrBkpLinkGroup
1839               DESCRIPTION
1840                       "This group should be implemented for devices
1841                       that support backup link functionality."
1842
1843               GROUP      hpicfGenRptrBkpLinkNotifyGroup
1844               DESCRIPTION
1845                       "This group should be implemented for devices
1846                       that support backup link functionality."
1847
1848               GROUP      hpicfGenRptrPortMappingGroup
1849               DESCRIPTION
1850                       "This group should be implemented for devices
1851                       that support moving segments or ports between
1852                       logical repeaters."
1853
1854               GROUP      hpicfGenRptrLoadBalanceGroup
1855               DESCRIPTION
1856                       "This group should be implemented for devices
1857                       that have multiple repeater segments, that can
1858                       support internal switch cards and/or
1859                       configuration of external switch links, and that
1860                       support load balancing between segments."
1861
1862               GROUP      hpicfGenRptrSwitchConfigGroup
1863               DESCRIPTION
1864                       "This group should be implemented for repeaters
1865                       that have multiple repeater segments and support
1866                       internal switch cards and/or configuration of
1867                       external switch links."
1868
1869               OBJECT     hubSecPtPreventEavesdrop
1870               MIN-ACCESS read-only
1871               DESCRIPTION
1872                       "100VG hubs implement this object as read-only,
1873                       since eavesdrop prevention is controlled by
1874                       whether or not a port is allowed to train as
1875                       promiscuous."
1876
1877           ::= { hpicfGenRptrCompliances 5 }
1878
1879       hpicfGenRptrCompliance3 MODULE-COMPLIANCE
1880           STATUS     current
1881           DESCRIPTION
1882                   "The compliance statement for HP managed repeater
1883                   systems."
1884           MODULE
1885               MANDATORY-GROUPS { hpicfGenRptrBasicGroup }
1886
1887               GROUP      hpicfGenRptrInfoGroup
1888               DESCRIPTION
1889                       "This group should be implemented for devices
1890                       that support multiple repeater segments
1891                       running at the same speed."
1892
1893               GROUP      hpicfGenRptrSecPtGroup
1894               DESCRIPTION
1895                       "This group should be implemented for devices
1896                       that support per-port security."
1897
1898               GROUP      hpicfSecPtGroup
1899               DESCRIPTION
1900                       "This group should be implemented for devices
1901                       that support per-port security with multiple
1902                       authorized addresses per port."
1903
1904               GROUP      hpicfGenRptrSecNotifyGroup
1905               DESCRIPTION
1906                       "This group should be implemented for devices
1907                       that support per-port security."
1908
1909               GROUP      hpicfGenRptrBkpLinkGroup
1910               DESCRIPTION
1911                       "This group should be implemented for devices
1912                       that support backup link functionality."
1913
1914               GROUP      hpicfGenRptrBkpLinkNotifyGroup
1915               DESCRIPTION
1916                       "This group should be implemented for devices
1917                       that support backup link functionality."
1918
1919               GROUP      hpicfGenRptrPortMappingGroup
1920               DESCRIPTION
1921                       "This group should be implemented for devices
1922                       that support moving segments or ports between
1923                       logical repeaters."
1924
1925               GROUP      hpicfGenRptrLoadBalanceGroup
1926               DESCRIPTION
1927                       "This group should be implemented for devices
1928                       that have multiple repeater segments, that can
1929                       support internal switch cards and/or
1930                       configuration of external switch links, and that
1931                       support load balancing between segments."
1932
1933               GROUP      hpicfGenRptrSwitchConfigGroup
1934               DESCRIPTION
1935                       "This group should be implemented for repeaters
1936                       that have multiple repeater segments and support
1937                       internal switch cards and/or configuration of
1938                       external switch links."
1939
1940               GROUP      hpicfGenRptrBridgeGroup
1941               DESCRIPTION
1942                       "This group should be implemented for repeater
1943                       systems that have an internal unmanaged bridge."
1944
1945               OBJECT     hubSecPtPreventEavesdrop
1946               MIN-ACCESS read-only
1947               DESCRIPTION
1948                       "100VG hubs implement this object as read-only,
1949                       since eavesdrop prevention is controlled by
1950                       whether or not a port is allowed to train as
1951                       promiscuous."
1952
1953           ::= { hpicfGenRptrCompliances 6 }
1954
1955       hpicfGenRptrMultiSecOnlyCompliance MODULE-COMPLIANCE
1956           STATUS      deprecated
1957           DESCRIPTION "********* THIS COMPLIANCE IS DEPRECATED *********
1958
1959                       The compliance statement for non-repeater devices
1960                       that implement per-port security with multiple
1961                       authorized address per port."
1962           MODULE
1963               MANDATORY-GROUPS { hpicfSecPtGroup }
1964
1965           ::= { hpicfGenRptrCompliances 7 }
1966
1967       hpicfGenRptrMultiSecOnlyCompliance2 MODULE-COMPLIANCE
1968           STATUS      current
1969           DESCRIPTION
1970                   "The updated compliance statement for non-repeater
1971                   devices that implement per-port security with multiple
1972                   authorized address per port."
1973           MODULE
1974               MANDATORY-GROUPS { hpicfSecPtGroup2 }
1975
1976           ::= { hpicfGenRptrCompliances 8 }
1977
1978
1979       -- units of conformance
1980
1981
1982       hpicfHubSecurityGroup OBJECT-GROUP
1983           OBJECTS    { hubSecPtGroupIndex,
1984                        hubSecPtPortIndex,
1985                        hubSecPtSecurityAddress,
1986                        hubSecPtAuthorizedAddress,
1987                        hubSecPtPreventEavesdrop,
1988                        hubSecPtAlarmEnable,
1989                        hubSecPtIntrusionFlag,
1990                        hubIntruderIndex,
1991                        hubIntruderGroup,
1992                        hubIntruderPort,
1993                        hubIntruderAddress,
1994                        hubIntruderTime
1995                      }
1996           STATUS     deprecated
1997           DESCRIPTION
1998                   "********* THIS GROUP IS DEPRECATED *********
1999
2000                   A collection of objects for managing per-port
2001                   security violations for a managed 802.3 repeater
2002                   system."
2003           ::= { hpicfGenRptrGroups 1 }
2004
2005       hpicfGenRptrBasicGroup OBJECT-GROUP
2006           OBJECTS    { hpGRpSelfHealEnable }
2007           STATUS     current
2008           DESCRIPTION
2009                   "A collection of objects for basic configuration
2010                   of a system containing repeaters."
2011           ::= { hpicfGenRptrGroups 2 }
2012
2013       hpicfGenRptrSecPtGroup OBJECT-GROUP
2014           OBJECTS    { hubSecPtGroupIndex,
2015                        hubSecPtPortIndex,
2016                        hubSecPtSecurityAddress,
2017                        hubSecPtAuthorizedAddress,
2018                        hubSecPtPreventEavesdrop,
2019                        hubSecPtAlarmEnable,
2020                        hubSecPtIntrusionFlag,
2021                        hubIntruderIndex,
2022                        hubIntruderGroup,
2023                        hubIntruderPort,
2024                        hubIntruderAddress,
2025                        hubIntruderTime,
2026                        hubIntruderType,
2027                        hubIntruderTrainingViolation
2028                      }
2029           STATUS     current
2030           DESCRIPTION
2031                   "A collection of objects for managing per-port
2032                   security in a managed repeater system."
2033           ::= { hpicfGenRptrGroups 3 }
2034
2035       hpicfGenRptrInfoGroup OBJECT-GROUP
2036           OBJECTS    { hpGRpRepeaterIfIndex,
2037                        hpGRpRepeaterName,
2038                        hpGRpRepeaterVlanIndex
2039                      }
2040           STATUS     current
2041           DESCRIPTION
2042                   "A collection of objects providing information
2043                   about logical repeaters in a system."
2044           ::= { hpicfGenRptrGroups 4 }
2045
2046       hpicfGenRptrBkpLinkGroup OBJECT-GROUP
2047           OBJECTS    { hpicfBackupLinkNextIndex,
2048                        hpicfBackupLinkPrimaryGroup,
2049                        hpicfBackupLinkPrimaryPort,
2050                        hpicfBackupLinkBackupGroup,
2051                        hpicfBackupLinkBackupPort,
2052                        hpicfBackupLinkAddress,
2053                        hpicfBackupLinkTestTime,
2054                        hpicfBackupLinkConsecFailures,
2055                        hpicfBackupLinkState,
2056                        hpicfBackupLinkFailEventIndex,
2057                        hpicfBackupLinkStatus
2058                      }
2059           STATUS     current
2060           DESCRIPTION
2061                   "A collection of objects for configuring backup
2062                   links in a managed repeater system."
2063           ::= { hpicfGenRptrGroups 5 }
2064
2065       hpicfGenRptrPortMappingGroup OBJECT-GROUP
2066           OBJECTS    { hpGRpPMCurrentRptrIndex,
2067                        hpGRpPMSegAllowedRptrIndex,
2068                        hpGRpPMPortEntPhysicalIndex,
2069                        hpGRpPMPortCurrentRptrIndex,
2070                        hpGRpPMPortAllowedRptrIndex,
2071                        hpGRpPortMapAutoConfigEnable
2072                      }
2073           STATUS     current
2074           DESCRIPTION
2075                   "A collection of objects for mapping repeater
2076                   segments and repeater ports to logical repeaters."
2077           ::= { hpicfGenRptrGroups 6 }
2078
2079       hpicfGenRptrLoadBalanceGroup OBJECT-GROUP
2080           OBJECTS    { hpGRpLoadBalanceNow,
2081                        hpGRpLastLoadBalanceTime
2082                      }
2083           STATUS     current
2084           DESCRIPTION
2085                   "A collection of objects for managing segment
2086                   load balancing on multisegment repeaters with
2087                   internal switches."
2088           ::= { hpicfGenRptrGroups 7 }
2089
2090       hpicfGenRptrSwitchConfigGroup OBJECT-GROUP
2091           OBJECTS    { hpicfGRpSwitchType,
2092                        hpicfGRpSwitchEntPhysicalIndex,
2093                        hpicfGRpSwitchLinkCount,
2094                        hpicfGRpSwitchStatus,
2095                        hpicfGRpSwitchLinkRptrGroup,
2096                        hpicfGRpSwitchLinkRptrPort,
2097                        hpicfGRpSwitchLinkState,
2098                        hpicfGRpCurrentPrimarySwitch,
2099                        hpicfGRpDesiredPrimarySwitch
2100                      }
2101           STATUS     current
2102           DESCRIPTION
2103                   "A collection of Objects for configuring internal and
2104                   external switches for switching between repeater
2105                   segments in a repeater system."
2106           ::= { hpicfGenRptrGroups 8 }
2107
2108       hpicfGenRptrSecNotifyGroup NOTIFICATION-GROUP
2109           NOTIFICATIONS { hpicfIntrusionTrap }
2110           STATUS     current
2111           DESCRIPTION
2112                   "A collection of notifications used to indicate
2113                   per-port security violations."
2114           ::= { hpicfGenRptrGroups 9 }
2115
2116       hpicfGenRptrBkpLinkNotifyGroup NOTIFICATION-GROUP
2117           NOTIFICATIONS { hpicfBackupLinkTrap }
2118           STATUS     current
2119           DESCRIPTION
2120                   "A collection of notifications used to indicate
2121                   state changes on a backup link."
2122           ::= { hpicfGenRptrGroups 10 }
2123
2124       hpicfSecPtGroup OBJECT-GROUP
2125           OBJECTS    { hpSecPtAddressLimit,
2126                        hpSecPtLearnMode,
2127                        hpSecPtPreventEavesdrop,
2128                        hpSecPtAlarmEnable,
2129                        hpSecPtIntrusionFlag,
2130                        hpSecCfgStatus,
2131                        hpSecAuthAddress,
2132                        hubIntruderIndex,
2133                        hubIntruderGroup,
2134                        hubIntruderPort,
2135                        hubIntruderAddress,
2136                        hubIntruderTime,
2137                        hubIntruderType,
2138                        hubIntruderTrainingViolation
2139                      }
2140           STATUS     deprecated
2141           DESCRIPTION
2142                   "********* THIS GROUP IS DEPRECATED *********
2143
2144                   A collection of objects for managing per-port
2145                   security in a managed repeater or switch system."
2146           ::= { hpicfGenRptrGroups 11 }
2147
2148       hpicfGenRptrBridgeGroup OBJECT-GROUP
2149           OBJECTS    { hpGRpBridgeAdminStatus }
2150           STATUS     current
2151           DESCRIPTION
2152                   "A collection of objects for basic configuration
2153                   of repeater system containing internal bridging."
2154           ::= { hpicfGenRptrGroups 12 }
2155
2156       hpicfSecPtGroup2 OBJECT-GROUP
2157           OBJECTS    { hpSecPtAddressLimit,
2158                        hpSecPtLearnMode,
2159                        hpSecPtAlarmEnable,
2160                        hpSecPtIntrusionFlag,
2161                        hpSecCfgStatus,
2162                        hpSecAuthAddress,
2163                        hubIntruderIndex,
2164                        hubIntruderGroup,
2165                        hubIntruderPort,
2166                        hubIntruderAddress,
2167                        hubIntruderTime,
2168                        hubIntruderType,
2169                        hubIntruderTrainingViolation
2170                      }
2171           STATUS     current
2172           DESCRIPTION
2173                   "A collection of objects for managing per-port
2174                   security in a managed repeater or switch system."
2175           ::= { hpicfGenRptrGroups 13 }
2176
2177       END
2178
2179