Node-Red configuration
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

rfc3417.txt 38KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067
  1. Network Working Group Editor of this version:
  2. Request for Comments: 3417 R. Presuhn
  3. STD: 62 BMC Software, Inc.
  4. Obsoletes: 1906 Authors of previous version:
  5. Category: Standards Track J. Case
  6. SNMP Research, Inc.
  7. K. McCloghrie
  8. Cisco Systems, Inc.
  9. M. Rose
  10. Dover Beach Consulting, Inc.
  11. S. Waldbusser
  12. International Network Services
  13. December 2002
  14. Transport Mappings for
  15. the Simple Network Management Protocol (SNMP)
  16. Status of this Memo
  17. This document specifies an Internet standards track protocol for the
  18. Internet community, and requests discussion and suggestions for
  19. improvements. Please refer to the current edition of the "Internet
  20. Official Protocol Standards" (STD 1) for the standardization state
  21. and status of this protocol. Distribution of this memo is unlimited.
  22. Copyright Notice
  23. Copyright (C) The Internet Society (2002). All Rights Reserved.
  24. Abstract
  25. This document defines the transport of Simple Network Management
  26. Protocol (SNMP) messages over various protocols. This document
  27. obsoletes RFC 1906.
  28. Presuhn, et al. Standards Track [Page 1]
  29. RFC 3417 Transport Mappings for SNMP December 2002
  30. Table of Contents
  31. 1. Introduction ................................................ 2
  32. 2. Definitions ................................................. 3
  33. 3. SNMP over UDP over IPv4 ..................................... 7
  34. 3.1. Serialization ............................................. 7
  35. 3.2. Well-known Values ......................................... 7
  36. 4. SNMP over OSI ............................................... 7
  37. 4.1. Serialization ............................................. 7
  38. 4.2. Well-known Values ......................................... 8
  39. 5. SNMP over DDP ............................................... 8
  40. 5.1. Serialization ............................................. 8
  41. 5.2. Well-known Values ......................................... 8
  42. 5.3. Discussion of AppleTalk Addressing ........................ 9
  43. 5.3.1. How to Acquire NBP names ................................ 9
  44. 5.3.2. When to Turn NBP names into DDP addresses ............... 10
  45. 5.3.3. How to Turn NBP names into DDP addresses ................ 10
  46. 5.3.4. What if NBP is broken ................................... 10
  47. 6. SNMP over IPX ............................................... 11
  48. 6.1. Serialization ............................................. 11
  49. 6.2. Well-known Values ......................................... 11
  50. 7. Proxy to SNMPv1 ............................................. 12
  51. 8. Serialization using the Basic Encoding Rules ................ 12
  52. 8.1. Usage Example ............................................. 13
  53. 9. Notice on Intellectual Property ............................. 14
  54. 10. Acknowledgments ............................................ 14
  55. 11. IANA Considerations ........................................ 15
  56. 12. Security Considerations .................................... 16
  57. 13. References ................................................. 16
  58. 13.1. Normative References ..................................... 16
  59. 13.2. Informative References ................................... 17
  60. 14. Changes from RFC 1906 ...................................... 18
  61. 15. Editor's Address ........................................... 18
  62. 16. Full Copyright Statement ................................... 19
  63. 1. Introduction
  64. For a detailed overview of the documents that describe the current
  65. Internet-Standard Management Framework, please refer to section 7 of
  66. RFC 3410 [RFC3410].
  67. Managed objects are accessed via a virtual information store, termed
  68. the Management Information Base or MIB. MIB objects are generally
  69. accessed through the Simple Network Management Protocol (SNMP).
  70. Objects in the MIB are defined using the mechanisms defined in the
  71. Structure of Management Information (SMI). This memo specifies a MIB
  72. Presuhn, et al. Standards Track [Page 2]
  73. RFC 3417 Transport Mappings for SNMP December 2002
  74. module that is compliant to the SMIv2, which is described in STD 58,
  75. RFC 2578 [RFC2578], STD 58, RFC 2579 [RFC2579] and STD 58, RFC 2580
  76. [RFC2580].
  77. This document, Transport Mappings for the Simple Network Management
  78. Protocol, defines how the management protocol [RFC3416] may be
  79. carried over a variety of protocol suites. It is the purpose of this
  80. document to define how the SNMP maps onto an initial set of transport
  81. domains. At the time of this writing, work was in progress to define
  82. an IPv6 mapping, described in [RFC3419]. Other mappings may be
  83. defined in the future.
  84. Although several mappings are defined, the mapping onto UDP over IPv4
  85. is the preferred mapping for systems supporting IPv4. Systems
  86. implementing IPv4 MUST implement the mapping onto UDP over IPv4. To
  87. maximize interoperability, systems supporting other mappings SHOULD
  88. also provide for access via the UDP over IPv4 mapping.
  89. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  90. "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
  91. document are to be interpreted as described in BCP 14, RFC 2119
  92. [RFC2119].
  93. 2. Definitions
  94. SNMPv2-TM DEFINITIONS ::= BEGIN
  95. IMPORTS
  96. MODULE-IDENTITY, OBJECT-IDENTITY,
  97. snmpModules, snmpDomains, snmpProxys
  98. FROM SNMPv2-SMI
  99. TEXTUAL-CONVENTION
  100. FROM SNMPv2-TC;
  101. snmpv2tm MODULE-IDENTITY
  102. LAST-UPDATED "200210160000Z"
  103. ORGANIZATION "IETF SNMPv3 Working Group"
  104. CONTACT-INFO
  105. "WG-EMail: snmpv3@lists.tislabs.com
  106. Subscribe: snmpv3-request@lists.tislabs.com
  107. Co-Chair: Russ Mundy
  108. Network Associates Laboratories
  109. postal: 15204 Omega Drive, Suite 300
  110. Rockville, MD 20850-4601
  111. USA
  112. EMail: mundy@tislabs.com
  113. phone: +1 301 947-7107
  114. Presuhn, et al. Standards Track [Page 3]
  115. RFC 3417 Transport Mappings for SNMP December 2002
  116. Co-Chair: David Harrington
  117. Enterasys Networks
  118. postal: 35 Industrial Way
  119. P. O. Box 5005
  120. Rochester, NH 03866-5005
  121. USA
  122. EMail: dbh@enterasys.com
  123. phone: +1 603 337-2614
  124. Editor: Randy Presuhn
  125. BMC Software, Inc.
  126. postal: 2141 North First Street
  127. San Jose, CA 95131
  128. USA
  129. EMail: randy_presuhn@bmc.com
  130. phone: +1 408 546-1006"
  131. DESCRIPTION
  132. "The MIB module for SNMP transport mappings.
  133. Copyright (C) The Internet Society (2002). This
  134. version of this MIB module is part of RFC 3417;
  135. see the RFC itself for full legal notices.
  136. "
  137. REVISION "200210160000Z"
  138. DESCRIPTION
  139. "Clarifications, published as RFC 3417."
  140. REVISION "199601010000Z"
  141. DESCRIPTION
  142. "Clarifications, published as RFC 1906."
  143. REVISION "199304010000Z"
  144. DESCRIPTION
  145. "The initial version, published as RFC 1449."
  146. ::= { snmpModules 19 }
  147. -- SNMP over UDP over IPv4
  148. snmpUDPDomain OBJECT-IDENTITY
  149. STATUS current
  150. DESCRIPTION
  151. "The SNMP over UDP over IPv4 transport domain.
  152. The corresponding transport address is of type
  153. SnmpUDPAddress."
  154. ::= { snmpDomains 1 }
  155. Presuhn, et al. Standards Track [Page 4]
  156. RFC 3417 Transport Mappings for SNMP December 2002
  157. SnmpUDPAddress ::= TEXTUAL-CONVENTION
  158. DISPLAY-HINT "1d.1d.1d.1d/2d"
  159. STATUS current
  160. DESCRIPTION
  161. "Represents a UDP over IPv4 address:
  162. octets contents encoding
  163. 1-4 IP-address network-byte order
  164. 5-6 UDP-port network-byte order
  165. "
  166. SYNTAX OCTET STRING (SIZE (6))
  167. -- SNMP over OSI
  168. snmpCLNSDomain OBJECT-IDENTITY
  169. STATUS current
  170. DESCRIPTION
  171. "The SNMP over CLNS transport domain.
  172. The corresponding transport address is of type
  173. SnmpOSIAddress."
  174. ::= { snmpDomains 2 }
  175. snmpCONSDomain OBJECT-IDENTITY
  176. STATUS current
  177. DESCRIPTION
  178. "The SNMP over CONS transport domain.
  179. The corresponding transport address is of type
  180. SnmpOSIAddress."
  181. ::= { snmpDomains 3 }
  182. SnmpOSIAddress ::= TEXTUAL-CONVENTION
  183. DISPLAY-HINT "*1x:/1x:"
  184. STATUS current
  185. DESCRIPTION
  186. "Represents an OSI transport-address:
  187. octets contents encoding
  188. 1 length of NSAP 'n' as an unsigned-integer
  189. (either 0 or from 3 to 20)
  190. 2..(n+1) NSAP concrete binary representation
  191. (n+2)..m TSEL string of (up to 64) octets
  192. "
  193. SYNTAX OCTET STRING (SIZE (1 | 4..85))
  194. Presuhn, et al. Standards Track [Page 5]
  195. RFC 3417 Transport Mappings for SNMP December 2002
  196. -- SNMP over DDP
  197. snmpDDPDomain OBJECT-IDENTITY
  198. STATUS current
  199. DESCRIPTION
  200. "The SNMP over DDP transport domain. The corresponding
  201. transport address is of type SnmpNBPAddress."
  202. ::= { snmpDomains 4 }
  203. SnmpNBPAddress ::= TEXTUAL-CONVENTION
  204. STATUS current
  205. DESCRIPTION
  206. "Represents an NBP name:
  207. octets contents encoding
  208. 1 length of object 'n' as an unsigned integer
  209. 2..(n+1) object string of (up to 32) octets
  210. n+2 length of type 'p' as an unsigned integer
  211. (n+3)..(n+2+p) type string of (up to 32) octets
  212. n+3+p length of zone 'q' as an unsigned integer
  213. (n+4+p)..(n+3+p+q) zone string of (up to 32) octets
  214. For comparison purposes, strings are
  215. case-insensitive. All strings may contain any octet
  216. other than 255 (hex ff)."
  217. SYNTAX OCTET STRING (SIZE (3..99))
  218. -- SNMP over IPX
  219. snmpIPXDomain OBJECT-IDENTITY
  220. STATUS current
  221. DESCRIPTION
  222. "The SNMP over IPX transport domain. The corresponding
  223. transport address is of type SnmpIPXAddress."
  224. ::= { snmpDomains 5 }
  225. SnmpIPXAddress ::= TEXTUAL-CONVENTION
  226. DISPLAY-HINT "4x.1x:1x:1x:1x:1x:1x.2d"
  227. STATUS current
  228. DESCRIPTION
  229. "Represents an IPX address:
  230. octets contents encoding
  231. 1-4 network-number network-byte order
  232. 5-10 physical-address network-byte order
  233. 11-12 socket-number network-byte order
  234. "
  235. SYNTAX OCTET STRING (SIZE (12))
  236. Presuhn, et al. Standards Track [Page 6]
  237. RFC 3417 Transport Mappings for SNMP December 2002
  238. -- for proxy to SNMPv1 (RFC 1157)
  239. rfc1157Proxy OBJECT IDENTIFIER ::= { snmpProxys 1 }
  240. rfc1157Domain OBJECT-IDENTITY
  241. STATUS deprecated
  242. DESCRIPTION
  243. "The transport domain for SNMPv1 over UDP over IPv4.
  244. The corresponding transport address is of type
  245. SnmpUDPAddress."
  246. ::= { rfc1157Proxy 1 }
  247. -- ::= { rfc1157Proxy 2 } this OID is obsolete
  248. END
  249. 3. SNMP over UDP over IPv4
  250. This is the preferred transport mapping.
  251. 3.1. Serialization
  252. Each instance of a message is serialized (i.e., encoded according to
  253. the convention of [BER]) onto a single UDP [RFC768] over IPv4
  254. [RFC791] datagram, using the algorithm specified in Section 8.
  255. 3.2. Well-known Values
  256. It is suggested that administrators configure their SNMP entities
  257. supporting command responder applications to listen on UDP port 161.
  258. Further, it is suggested that SNMP entities supporting notification
  259. receiver applications be configured to listen on UDP port 162.
  260. When an SNMP entity uses this transport mapping, it must be capable
  261. of accepting messages up to and including 484 octets in size. It is
  262. recommended that implementations be capable of accepting messages of
  263. up to 1472 octets in size. Implementation of larger values is
  264. encouraged whenever possible.
  265. 4. SNMP over OSI
  266. This is an optional transport mapping.
  267. 4.1. Serialization
  268. Each instance of a message is serialized onto a single TSDU [IS8072]
  269. [IS8072A] for the OSI Connectionless-mode Transport Service (CLTS),
  270. using the algorithm specified in Section 8.
  271. Presuhn, et al. Standards Track [Page 7]
  272. RFC 3417 Transport Mappings for SNMP December 2002
  273. 4.2. Well-known Values
  274. It is suggested that administrators configure their SNMP entities
  275. supporting command responder applications to listen on transport
  276. selector "snmp-l" (which consists of six ASCII characters), when
  277. using a CL-mode network service to realize the CLTS. Further, it is
  278. suggested that SNMP entities supporting notification receiver
  279. applications be configured to listen on transport selector "snmpt-l"
  280. (which consists of seven ASCII characters, six letters and a hyphen)
  281. when using a CL-mode network service to realize the CLTS. Similarly,
  282. when using a CO-mode network service to realize the CLTS, the
  283. suggested transport selectors are "snmp-o" and "snmpt-o", for command
  284. responders and notification receivers, respectively.
  285. When an SNMP entity uses this transport mapping, it must be capable
  286. of accepting messages that are at least 484 octets in size.
  287. Implementation of larger values is encouraged whenever possible.
  288. 5. SNMP over DDP
  289. This is an optional transport mapping.
  290. 5.1. Serialization
  291. Each instance of a message is serialized onto a single DDP datagram
  292. [APPLETALK], using the algorithm specified in Section 8.
  293. 5.2. Well-known Values
  294. SNMP messages are sent using DDP protocol type 8. SNMP entities
  295. supporting command responder applications listen on DDP socket number
  296. 8, while SNMP entities supporting notification receiver applications
  297. listen on DDP socket number 9.
  298. Administrators must configure their SNMP entities supporting command
  299. responder applications to use NBP type "SNMP Agent" (which consists
  300. of ten ASCII characters) while those supporting notification receiver
  301. applications must be configured to use NBP type "SNMP Trap Handler"
  302. (which consists of seventeen ASCII characters).
  303. The NBP name for SNMP entities supporting command responders and
  304. notification receivers should be stable - NBP names should not change
  305. any more often than the IP address of a typical TCP/IP node. It is
  306. suggested that the NBP name be stored in some form of stable storage.
  307. When an SNMP entity uses this transport mapping, it must be capable
  308. of accepting messages that are at least 484 octets in size.
  309. Implementation of larger values is encouraged whenever possible.
  310. Presuhn, et al. Standards Track [Page 8]
  311. RFC 3417 Transport Mappings for SNMP December 2002
  312. 5.3. Discussion of AppleTalk Addressing
  313. The AppleTalk protocol suite has certain features not manifest in the
  314. TCP/IP suite. AppleTalk's naming strategy and the dynamic nature of
  315. address assignment can cause problems for SNMP entities that wish to
  316. manage AppleTalk networks. TCP/IP nodes have an associated IP
  317. address which distinguishes each from the other. In contrast,
  318. AppleTalk nodes generally have no such characteristic. The network-
  319. level address, while often relatively stable, can change at every
  320. reboot (or more frequently).
  321. Thus, when SNMP is mapped over DDP, nodes are identified by a "name",
  322. rather than by an "address". Hence, all AppleTalk nodes that
  323. implement this mapping are required to respond to NBP lookups and
  324. confirms (e.g., implement the NBP protocol stub), which guarantees
  325. that a mapping from NBP name to DDP address will be possible.
  326. In determining the SNMP identity to register for an SNMP entity, it
  327. is suggested that the SNMP identity be a name which is associated
  328. with other network services offered by the machine.
  329. NBP lookups, which are used to map NBP names into DDP addresses, can
  330. cause large amounts of network traffic as well as consume CPU
  331. resources. It is also the case that the ability to perform an NBP
  332. lookup is sensitive to certain network disruptions (such as zone
  333. table inconsistencies) which would not prevent direct AppleTalk
  334. communications between two SNMP entities.
  335. Thus, it is recommended that NBP lookups be used infrequently,
  336. primarily to create a cache of name-to-address mappings. These
  337. cached mappings should then be used for any further SNMP traffic. It
  338. is recommended that SNMP entities supporting command generator
  339. applications should maintain this cache between reboots. This
  340. caching can help minimize network traffic, reduce CPU load on the
  341. network, and allow for (some amount of) network trouble shooting when
  342. the basic name-to-address translation mechanism is broken.
  343. 5.3.1. How to Acquire NBP names
  344. An SNMP entity supporting command generator applications may have a
  345. pre-configured list of names of "known" SNMP entities supporting
  346. command responder applications. Similarly, an SNMP entity supporting
  347. command generator or notification receiver applications might
  348. interact with an operator. Finally, an SNMP entity supporting
  349. command generator or notification receiver applications might
  350. communicate with all SNMP entities supporting command responder or
  351. notification originator applications in a set of zones or networks.
  352. Presuhn, et al. Standards Track [Page 9]
  353. RFC 3417 Transport Mappings for SNMP December 2002
  354. 5.3.2. When to Turn NBP names into DDP addresses
  355. When an SNMP entity uses a cache entry to address an SNMP packet, it
  356. should attempt to confirm the validity mapping, if the mapping hasn't
  357. been confirmed within the last T1 seconds. This cache entry
  358. lifetime, T1, has a minimum, default value of 60 seconds, and should
  359. be configurable.
  360. An SNMP entity supporting a command generator application may decide
  361. to prime its cache of names prior to actually communicating with
  362. another SNMP entity. In general, it is expected that such an entity
  363. may want to keep certain mappings "more current" than other mappings,
  364. e.g., those nodes which represent the network infrastructure (e.g.,
  365. routers) may be deemed "more important".
  366. Note that an SNMP entity supporting command generator applications
  367. should not prime its entire cache upon initialization - rather, it
  368. should attempt resolutions over an extended period of time (perhaps
  369. in some pre-determined or configured priority order). Each of these
  370. resolutions might, in fact, be a wildcard lookup in a given zone.
  371. An SNMP entity supporting command responder applications must never
  372. prime its cache. When generating a response, such an entity does not
  373. need to confirm a cache entry. An SNMP entity supporting
  374. notification originator applications should do NBP lookups (or
  375. confirms) only when it needs to send an SNMP trap or inform.
  376. 5.3.3. How to Turn NBP names into DDP addresses
  377. If the only piece of information available is the NBP name, then an
  378. NBP lookup should be performed to turn that name into a DDP address.
  379. However, if there is a piece of stale information, it can be used as
  380. a hint to perform an NBP confirm (which sends a unicast to the
  381. network address which is presumed to be the target of the name
  382. lookup) to see if the stale information is, in fact, still valid.
  383. An NBP name to DDP address mapping can also be confirmed implicitly
  384. using only SNMP transactions. For example, an SNMP entity supporting
  385. command generator applications issuing a retrieval operation could
  386. also retrieve the relevant objects from the NBP group [RFC1742] for
  387. the SNMP entity supporting the command responder application. This
  388. information can then be correlated with the source DDP address of the
  389. response.
  390. 5.3.4. What if NBP is broken
  391. Under some circumstances, there may be connectivity between two SNMP
  392. entities, but the NBP mapping machinery may be broken, e.g.,
  393. Presuhn, et al. Standards Track [Page 10]
  394. RFC 3417 Transport Mappings for SNMP December 2002
  395. o the NBP FwdReq (forward NBP lookup onto local attached network)
  396. mechanism might be broken at a router on the other entity's
  397. network; or,
  398. o the NBP BrRq (NBP broadcast request) mechanism might be broken at
  399. a router on the entity's own network; or,
  400. o NBP might be broken on the other entity's node.
  401. An SNMP entity supporting command generator applications which is
  402. dedicated to AppleTalk management might choose to alleviate some of
  403. these failures by directly implementing the router portion of NBP.
  404. For example, such an entity might already know all the zones on the
  405. AppleTalk internet and the networks on which each zone appears.
  406. Given an NBP lookup which fails, the entity could send an NBP FwdReq
  407. to the network in which the SNMP entity supporting the command
  408. responder or notification originator application was last located.
  409. If that failed, the station could then send an NBP LkUp (NBP lookup
  410. packet) as a directed (DDP) multicast to each network number on that
  411. network. Of the above (single) failures, this combined approach will
  412. solve the case where either the local router's BrRq-to-FwdReq
  413. mechanism is broken or the remote router's FwdReq-to-LkUp mechanism
  414. is broken.
  415. 6. SNMP over IPX
  416. This is an optional transport mapping.
  417. 6.1. Serialization
  418. Each instance of a message is serialized onto a single IPX datagram
  419. [NOVELL], using the algorithm specified in Section 8.
  420. 6.2. Well-known Values
  421. SNMP messages are sent using IPX packet type 4 (i.e., Packet Exchange
  422. Protocol).
  423. It is suggested that administrators configure their SNMP entities
  424. supporting command responder applications to listen on IPX socket
  425. 36879 (900f hexadecimal). Further, it is suggested that those
  426. supporting notification receiver applications be configured to listen
  427. on IPX socket 36880 (9010 hexadecimal).
  428. When an SNMP entity uses this transport mapping, it must be capable
  429. of accepting messages that are at least 546 octets in size.
  430. Implementation of larger values is encouraged whenever possible.
  431. Presuhn, et al. Standards Track [Page 11]
  432. RFC 3417 Transport Mappings for SNMP December 2002
  433. 7. Proxy to SNMPv1
  434. Historically, in order to support proxy to SNMPv1, as defined in
  435. [RFC2576], it was deemed useful to define a transport domain,
  436. rfc1157Domain, which indicates the transport mapping for SNMP
  437. messages as defined in [RFC1157].
  438. 8. Serialization using the Basic Encoding Rules
  439. When the Basic Encoding Rules [BER] are used for serialization:
  440. (1) When encoding the length field, only the definite form is used;
  441. use of the indefinite form encoding is prohibited. Note that
  442. when using the definite-long form, it is permissible to use
  443. more than the minimum number of length octets necessary to
  444. encode the length field.
  445. (2) When encoding the value field, the primitive form shall be used
  446. for all simple types, i.e., INTEGER, OCTET STRING, and OBJECT
  447. IDENTIFIER (either IMPLICIT or explicit). The constructed form
  448. of encoding shall be used only for structured types, i.e., a
  449. SEQUENCE or an IMPLICIT SEQUENCE.
  450. (3) When encoding an object whose syntax is described using the
  451. BITS construct, the value is encoded as an OCTET STRING, in
  452. which all the named bits in (the definition of) the bitstring,
  453. commencing with the first bit and proceeding to the last bit,
  454. are placed in bits 8 (high order bit) to 1 (low order bit) of
  455. the first octet, followed by bits 8 to 1 of each subsequent
  456. octet in turn, followed by as many bits as are needed of the
  457. final subsequent octet, commencing with bit 8. Remaining bits,
  458. if any, of the final octet are set to zero on generation and
  459. ignored on receipt.
  460. These restrictions apply to all aspects of ASN.1 encoding, including
  461. the message wrappers, protocol data units, and the data objects they
  462. contain.
  463. Presuhn, et al. Standards Track [Page 12]
  464. RFC 3417 Transport Mappings for SNMP December 2002
  465. 8.1. Usage Example
  466. As an example of applying the Basic Encoding Rules, suppose one
  467. wanted to encode an instance of the GetBulkRequest-PDU [RFC3416]:
  468. [5] IMPLICIT SEQUENCE {
  469. request-id 1414684022,
  470. non-repeaters 1,
  471. max-repetitions 2,
  472. variable-bindings {
  473. { name sysUpTime,
  474. value { unSpecified NULL } },
  475. { name ipNetToMediaPhysAddress,
  476. value { unSpecified NULL } },
  477. { name ipNetToMediaType,
  478. value { unSpecified NULL } }
  479. }
  480. }
  481. Applying the BER, this may be encoded (in hexadecimal) as:
  482. [5] IMPLICIT SEQUENCE a5 82 00 39
  483. INTEGER 02 04 54 52 5d 76
  484. INTEGER 02 01 01
  485. INTEGER 02 01 02
  486. SEQUENCE (OF) 30 2b
  487. SEQUENCE 30 0b
  488. OBJECT IDENTIFIER 06 07 2b 06 01 02 01 01 03
  489. NULL 05 00
  490. SEQUENCE 30 0d
  491. OBJECT IDENTIFIER 06 09 2b 06 01 02 01 04 16 01 02
  492. NULL 05 00
  493. SEQUENCE 30 0d
  494. OBJECT IDENTIFIER 06 09 2b 06 01 02 01 04 16 01 04
  495. NULL 05 00
  496. Note that the initial SEQUENCE in this example was not encoded using
  497. the minimum number of length octets. (The first octet of the length,
  498. 82, indicates that the length of the content is encoded in the next
  499. two octets.)
  500. Presuhn, et al. Standards Track [Page 13]
  501. RFC 3417 Transport Mappings for SNMP December 2002
  502. 9. Notice on Intellectual Property
  503. The IETF takes no position regarding the validity or scope of any
  504. intellectual property or other rights that might be claimed to
  505. pertain to the implementation or use of the technology described in
  506. this document or the extent to which any license under such rights
  507. might or might not be available; neither does it represent that it
  508. has made any effort to identify any such rights. Information on the
  509. IETF's procedures with respect to rights in standards-track and
  510. standards-related documentation can be found in BCP-11. Copies of
  511. claims of rights made available for publication and any assurances of
  512. licenses to be made available, or the result of an attempt made to
  513. obtain a general license or permission for the use of such
  514. proprietary rights by implementors or users of this specification can
  515. be obtained from the IETF Secretariat.
  516. The IETF invites any interested party to bring to its attention any
  517. copyrights, patents or patent applications, or other proprietary
  518. rights which may cover technology that may be required to practice
  519. this standard. Please address the information to the IETF Executive
  520. Director.
  521. 10. Acknowledgments
  522. This document is the product of the SNMPv3 Working Group. Some
  523. special thanks are in order to the following Working Group members:
  524. Randy Bush
  525. Jeffrey D. Case
  526. Mike Daniele
  527. Rob Frye
  528. Lauren Heintz
  529. Keith McCloghrie
  530. Russ Mundy
  531. David T. Perkins
  532. Randy Presuhn
  533. Aleksey Romanov
  534. Juergen Schoenwaelder
  535. Bert Wijnen
  536. This version of the document, edited by Randy Presuhn, was initially
  537. based on the work of a design team whose members were:
  538. Jeffrey D. Case
  539. Keith McCloghrie
  540. David T. Perkins
  541. Randy Presuhn
  542. Juergen Schoenwaelder
  543. Presuhn, et al. Standards Track [Page 14]
  544. RFC 3417 Transport Mappings for SNMP December 2002
  545. The previous versions of this document, edited by Keith McCloghrie,
  546. was the result of significant work by four major contributors:
  547. Jeffrey D. Case
  548. Keith McCloghrie
  549. Marshall T. Rose
  550. Steven Waldbusser
  551. Additionally, the contributions of the SNMPv2 Working Group to the
  552. previous versions are also acknowledged. In particular, a special
  553. thanks is extended for the contributions of:
  554. Alexander I. Alten
  555. Dave Arneson
  556. Uri Blumenthal
  557. Doug Book
  558. Kim Curran
  559. Jim Galvin
  560. Maria Greene
  561. Iain Hanson
  562. Dave Harrington
  563. Nguyen Hien
  564. Jeff Johnson
  565. Michael Kornegay
  566. Deirdre Kostick
  567. David Levi
  568. Daniel Mahoney
  569. Bob Natale
  570. Brian O'Keefe
  571. Andrew Pearson
  572. Dave Perkins
  573. Randy Presuhn
  574. Aleksey Romanov
  575. Shawn Routhier
  576. Jon Saperia
  577. Juergen Schoenwaelder
  578. Bob Stewart
  579. Kaj Tesink
  580. Glenn Waters
  581. Bert Wijnen
  582. 11. IANA Considerations
  583. The SNMPv2-TM MIB module requires the allocation of a single object
  584. identifier for its MODULE-IDENTITY. IANA has allocated this object
  585. identifier in the snmpModules subtree, defined in the SNMPv2-SMI MIB
  586. module.
  587. Presuhn, et al. Standards Track [Page 15]
  588. RFC 3417 Transport Mappings for SNMP December 2002
  589. 12. Security Considerations
  590. SNMPv1 by itself is not a secure environment. Even if the network
  591. itself is secure (for example by using IPSec), even then, there is no
  592. control as to who on the secure network is allowed to access and
  593. GET/SET (read/change) the objects accessible through a command
  594. responder application.
  595. It is recommended that the implementors consider the security
  596. features as provided by the SNMPv3 framework. Specifically, the use
  597. of the User-based Security Model STD 62, RFC 3414 [RFC3414] and the
  598. View-based Access Control Model STD 62, RFC 3415 [RFC3415] is
  599. recommended.
  600. It is then a customer/user responsibility to ensure that the SNMP
  601. entity giving access to a MIB is properly configured to give access
  602. to the objects only to those principals (users) that have legitimate
  603. rights to indeed GET or SET (change) them.
  604. 13. References
  605. 13.1. Normative References
  606. [BER] Information processing systems - Open Systems
  607. Interconnection - Specification of Basic Encoding Rules
  608. for Abstract Syntax Notation One (ASN.1), International
  609. Organization for Standardization. International Standard
  610. 8825, December 1987.
  611. [IS8072] Information processing systems - Open Systems
  612. Interconnection - Transport Service Definition,
  613. International Organization for Standardization.
  614. International Standard 8072, June 1986.
  615. [IS8072A] Information processing systems - Open Systems
  616. Interconnection - Transport Service Definition - Addendum
  617. 1: Connectionless-mode Transmission, International
  618. Organization for Standardization. International Standard
  619. 8072/AD 1, December 1986.
  620. [RFC768] Postel, J., "User Datagram Protocol", STD 6, RFC 768,
  621. August 1980.
  622. [RFC791] Postel, J., "Internet Protocol", STD 5, RFC 791,
  623. September 1981.
  624. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
  625. Requirement Levels", BCP 14, RFC 2119, March 1997.
  626. Presuhn, et al. Standards Track [Page 16]
  627. RFC 3417 Transport Mappings for SNMP December 2002
  628. [RFC2578] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,
  629. Rose, M. and S. Waldbusser, "Structure of Management
  630. Information Version 2 (SMIv2)", STD 58, RFC 2578, April
  631. 1999.
  632. [RFC2579] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,
  633. Rose, M. and S. Waldbusser, "Textual Conventions for
  634. SMIv2", STD 58, RFC 2579, April 1999.
  635. [RFC2580] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,
  636. Rose, M. and S. Waldbusser, "Conformance Statements for
  637. SMIv2", STD 58, RFC 2580, April 1999.
  638. [RFC3414] Blumenthal, U. and B. Wijnen, "The User-Based Security
  639. Model (USM) for Version 3 of the Simple Network
  640. Management Protocol (SNMPv3)", STD 62, RFC 3414, December
  641. 2002.
  642. [RFC3415] Wijnen, B., Presuhn, R. and K. McCloghrie, "View-based
  643. Access Control Model (VACM) for the Simple Network
  644. Management Protocol (SNMP)", STD 62, RFC 3415, December
  645. 2002.
  646. [RFC3416] Presuhn, R., Case, J., McCloghrie, K., Rose, M. and S.
  647. Waldbusser, "Version 2 of the Protocol Operations for the
  648. Simple Network Management Protocol (SNMP)", STD 62, RFC
  649. 3416, December 2002.
  650. 13.2. Informative References
  651. [APPLETALK] Sidhu, G., Andrews, R. and A. Oppenheimer, Inside
  652. AppleTalk (second edition). Addison-Wesley, 1990.
  653. [NOVELL] Network System Technical Interface Overview. Novell,
  654. Inc., June 1989.
  655. [RFC1157] Case, J., Fedor, M., Schoffstall, M. and J. Davin,
  656. "Simple Network Management Protocol", STD 15, RFC 1157,
  657. May 1990.
  658. [RFC1742] Waldbusser, S. and K. Frisa, "AppleTalk Management
  659. Information Base II", RFC 1742, January 1995.
  660. [RFC2576] Frye, R., Levi, D., Routhier, S. and B. Wijnen,
  661. "Coexistence between Version 1, Version 2, and Version 3
  662. of the Internet-Standard Network Management Framework",
  663. RFC 2576, March 2000.
  664. Presuhn, et al. Standards Track [Page 17]
  665. RFC 3417 Transport Mappings for SNMP December 2002
  666. [RFC3410] Case, J., Mundy, R., Partain, D. and B. Stewart,
  667. "Introduction and Applicability Statements for Internet-
  668. Standard Management Framework", RFC 3410, December 2002.
  669. [RFC3419] Daniele, M. and J. Schoenwaelder, "Textual Conventions
  670. for Transport Addresses", RFC 3419, November 2002.
  671. 14. Changes from RFC 1906
  672. This document differs from RFC 1906 only in editorial improvements.
  673. The protocol is unchanged.
  674. 15. Editor's Address
  675. Randy Presuhn
  676. BMC Software, Inc.
  677. 2141 North First Street
  678. San Jose, CA 95131
  679. USA
  680. Phone: +1 408 546-1006
  681. EMail: randy_presuhn@bmc.com
  682. Presuhn, et al. Standards Track [Page 18]
  683. RFC 3417 Transport Mappings for SNMP December 2002
  684. 16. Full Copyright Statement
  685. Copyright (C) The Internet Society (2002). All Rights Reserved.
  686. This document and translations of it may be copied and furnished to
  687. others, and derivative works that comment on or otherwise explain it
  688. or assist in its implementation may be prepared, copied, published
  689. and distributed, in whole or in part, without restriction of any
  690. kind, provided that the above copyright notice and this paragraph are
  691. included on all such copies and derivative works. However, this
  692. document itself may not be modified in any way, such as by removing
  693. the copyright notice or references to the Internet Society or other
  694. Internet organizations, except as needed for the purpose of
  695. developing Internet standards in which case the procedures for
  696. copyrights defined in the Internet Standards process must be
  697. followed, or as required to translate it into languages other than
  698. English.
  699. The limited permissions granted above are perpetual and will not be
  700. revoked by the Internet Society or its successors or assigns.
  701. This document and the information contained herein is provided on an
  702. "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
  703. TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
  704. BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
  705. HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
  706. MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
  707. Acknowledgement
  708. Funding for the RFC Editor function is currently provided by the
  709. Internet Society.
  710. Presuhn, et al. Standards Track [Page 19]