Internet Engineering Task Force R. Cole Internet-Draft Johns Hopkins University Intended status: Standards Track J. Macker Expires: May 7, 2009 B. Adamson Navy Research Laboratory S. Harnedy Booz Allen Hamilton November 3, 2008 Definition of Managed Objects for the Manet Simplified Multicast Framework Relay Set Process draft-cole-manet-smf-mib-01 Status of This Memo By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on May 7, 2009. Copyright Notice Copyright (C) The IETF Trust (2008). Abstract This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes objects for configuring aspects of the Cole, et al. Expires May 7, 2009 [Page 1]
Internet-Draft The SMF MIB November 2008 Simplified Multicast Forwarding (SMF) process. The SMF MIB also reports state information, performance metrics, and notifications. In addition to configuration, this additional state and performance information is useful to management stations troubleshooting multicast forwarding problems. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. The Internet-Standard Management Framework . . . . . . . . . . 3 3. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 3 4. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 4.1. SMF Management Model . . . . . . . . . . . . . . . . . . . 4 4.2. Terms . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5. Structure of the MIB Module . . . . . . . . . . . . . . . . . 6 5.1. Textual Conventions . . . . . . . . . . . . . . . . . . . 6 5.2. The Configuration Group . . . . . . . . . . . . . . . . . 6 5.3. The State Group . . . . . . . . . . . . . . . . . . . . . 7 5.4. The Performance Group . . . . . . . . . . . . . . . . . . 7 5.5. The Notifications Group . . . . . . . . . . . . . . . . . 7 6. Relationship to Other MIB Modules . . . . . . . . . . . . . . 8 6.1. Relationship to the SNMPv2-MIB . . . . . . . . . . . . . . 8 6.2. Relationship to the IF-MIB . . . . . . . . . . . . . . . . 8 6.3. MIB modules required for IMPORTS . . . . . . . . . . . . . 8 7. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 8 8. Security Considerations . . . . . . . . . . . . . . . . . . . 33 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 35 10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 35 11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 36 12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 36 12.1. Normative References . . . . . . . . . . . . . . . . . . . 36 12.2. Informative References . . . . . . . . . . . . . . . . . . 36 Appendix A. Change Log . . . . . . . . . . . . . . . . . . . . . 36 Appendix B. Open Issues . . . . . . . . . . . . . . . . . . . . . 37 Cole, et al. Expires May 7, 2009 [Page 2]
Internet-Draft The SMF MIB November 2008 1. Introduction This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes objects for configuring aspects of a process implementing Simplified Multicast Forwarding (SMF) [I-D.ietf-manet-smf]. SMF provides multicast duplicate packet detection (DPD) and supports algorithms for constructing an estimate of a mobile ad hoc network (MANET) Minimum Connected Dominating Set (MCDS) for efficient multicast forwarding. The SMF MIB also reports state information, performance metrics, and notifications. In addition to configuration, this additional state and performance information is useful to management stations troubleshooting multicast forwarding problems. 2. The Internet-Standard Management Framework For a detailed overview of the documents that describe the current Internet-Standard Management Framework, please refer to section 7 of RFC 3410 [RFC3410]. Managed objects are accessed via a virtual information store, termed the Management Information Base or MIB. MIB objects are generally accessed through the Simple Network Management Protocol (SNMP). Objects in the MIB are defined using the mechanisms defined in the Structure of Management Information (SMI). This memo specifies a MIB module that is compliant to the SMIv2, which is described in STD 58, RFC 2578 [RFC2578], STD 58, RFC 2579 [RFC2579] and STD 58, RFC 2580 [RFC2580]. 3. Conventions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. 4. Overview SMF provides methods for implementing DPD-based multicast forwarding with the optional use of CDS-based relay sets. The MCDS is the smallest set of MANET nodes (comprising a connected cluster) which cover all the nodes in the cluster with their transmissions. As the density of the MANET nodes increase, the fraction of nodes required in an MCDS decreases. Using the MCDS as a multicast forwarding set then becomes an efficient multicast mechanism for MANETs. Various algorithms for the construction of estimates of the MCDS exist. The Simplified Multicast Framework [I-D.ietf-manet-smf] Cole, et al. Expires May 7, 2009 [Page 3]
Internet-Draft The SMF MIB November 2008 describes some of these. It further defines various operational modes for a node which is participating in the collective creation of the MCDS estimates. These modes depend upon the set of related MANET routing and discovery protocols and mechanisms in operation in the specific MANET node. A SMF routers' MIB contains SMF process configuration parameters (e.g. specific CDS algorithm), state information (e.g., current membership in the CDS), performance counters (e.g., packet counters), and notifications. 4.1. SMF Management Model This section describes the management model for the SMF node process. Figure 1 (reproduced from Figure 4 of [I-D.ietf-manet-smf]) shows the relationship between the SMF Relay Set selection algorithm and the related algorithms, processes and protocols running in the MANET nodes. The Relay Set Selection Algorithm (RSSA) can rely upon topology information gotten from the MANET Neighborhood Discovery Protocol (NHDP), from the specific MANET routing protocol running on the node, or from Layer 2 information passed up to the higher layer protocol processes. Cole, et al. Expires May 7, 2009 [Page 4]
Internet-Draft The SMF MIB November 2008 Possible L2 Trigger/Information | | ______________ ______|_____ __________________ | MANET | | | | | | Neighborhood | | Relay Set | | Other Heuristics | | Discovery |------------| Selection |-------| (Preference,etc) | | Protocol | neighbor | Algorithm | | | |______________| info |____________| |__________________| \ / \ / neighbor\ / Dynamic Relay info* \ ____________ / Set Status \ | SMF | / (State, {neighbor info}) `---| Relay Set |---' | State | ---|____________| / / ______________ | Coexistent | | MANET | | Unicast | | Process | |______________| Figure 1: SMF Relay Set Control Options 4.2. Terms The following definitions apply throughout this document: o Configuration Objects - switches, tables, objects which are initialized to default settings or set through the management interface defined by this MIB. o Tunable Configuration Objects - objects whose values affect timing or attempt bounds on the SMF RS process. o State Objects - automatically generated values which define the current operating state of the SMF RS process in the router. o Performance Objects - automatically generated values which help an administrator or automated tool to assess the performance of the CDS multicast process on the router and the overall multicasting performance within the MANET routing domain. Cole, et al. Expires May 7, 2009 [Page 5]
Internet-Draft The SMF MIB November 2008 5. Structure of the MIB Module This section presents the structure of the SMF MIB module. The objects are arranged into the following groups: o smfMIBNotifications - defines the notifications associated with the SMF MIB. o smfMIBObjects - defines the objects forming the basis for the SMF MIB. These objects are divided up by function into the following groups: * Configuration Group - This group contains the SMF objects that configure specific options that determine the overall operation of the SMF RSSA and the resulting multicast performance. * State Group - Contains information describing the current state of the SMF RSSA process such as the Neighbor Table. * Performance Group - Contains objects which help to characterize the performance of the SMF RSSA process, typically statistics counters. o smfMIBConformance - defines minimal and full conformance of implementations to this SMF MIB. 5.1. Textual Conventions The textual conventions used in the SMF MIB are as follows. The RowStatus textual convention is imported from RFC 2579 [RFC2579]. 5.2. The Configuration Group The SMF device is configured with a set of controls. The list of configuration controls for the SMF device follow. o Operational Mode - topology information from NHDP, CDS-aware unicast routing or Cross-layer from Layer 2 o SMF RSSA - the specific RSSA operational on the device o Duplicate Packet detection for IPv4 - Identification-based or Hash-based DPD o Duplicate Packet detection for IPv6 - Identification-based or Hash-based DPD Cole, et al. Expires May 7, 2009 [Page 6]
Internet-Draft The SMF MIB November 2008 o NHDP RSSA Message TLV - if NHDP mode is selected, then is the RSSA Message TLV included in the NHDP exchanges. (Question: Is this and the following two TLVs optional and are they included as a group or independently of one another?) o NHDP RSSA Address Block TLV - if NHDP mode is selected, then is the RSSA Address Block TLV included in the NHDP exchanges. o Router Priority TLV - if NHDP mode is selected, then is the Router Priority TLV included in the NHDP exchanges. 5.3. The State Group The State Subtree reports current state information. o Node RSS State - is the node currently in or out of the Relay Set. o Neighbors Table - a table containing current neighbors and their operational RSSA. 5.4. The Performance Group The Performance subtree reports primarily counters that relate to SMF RSSA performance. The SMF performance counters consists of per node and per interface objects: (Note: Need to have a discussion of the important and measurable events related to SMF RSSA multicast performance.) (Note: Do we need to break these out by type, i.e., v4 versus v6?) o Total multicast packets received - o Total multicast packets forwarded - o Total duplicate multicast packets detected - o Per interface statistics table with the following entries: * Multicast packets received * Multicast packets forwarded * Duplicate multicast packets detected 5.5. The Notifications Group The Notifications Subtree contains the list of notifications supported within the SMF-MIB and their intended purpose or utility. This group is currently empty. Cole, et al. Expires May 7, 2009 [Page 7]
Internet-Draft The SMF MIB November 2008 6. Relationship to Other MIB Modules [TODO]: The text of this section specifies the relationship of the MIB modules contained in this document to other standards, particularly to standards containing other MIB modules. Definitions imported from other MIB modules and other MIB modules that SHOULD be implemented in conjunction with the MIB module contained within this document are identified in this section. 6.1. Relationship to the SNMPv2-MIB The 'system' group in the SNMPv2-MIB [RFC3418] is defined as being mandatory for all systems, and the objects apply to the entity as a whole. The 'system' group provides identification of the management entity and certain other system-wide data. The SMF-MIB does not duplicate those objects. 6.2. Relationship to the IF-MIB [TODO] This section is included as an example; If the MIB module is not an adjunct of the Interface MIB, then this section should be removed. 6.3. MIB modules required for IMPORTS [TODO]: Citations are not permitted within a MIB module, but any module mentioned in an IMPORTS clause or document mentioned in a REFERENCE clause is a Normative reference, and must be cited someplace within the narrative sections. If there are imported items in the MIB module, such as Textual Conventions, that are not already cited, they can be cited in text here. Since relationships to other MIB modules should be described in the narrative text, this section is typically used to cite modules from which Textual Conventions are imported. The following SMF-MIB module IMPORTS objects from SNMPv2-SMI [RFC2578], SNMPv2-TC [RFC2579], SNMPv2-CONF [RFC2580], and IF-MIB [RFC2863] 7. Definitions MANET-SMF-MIB DEFINITIONS ::= BEGIN IMPORTS MODULE-IDENTITY, OBJECT-TYPE, Counter32, mib-2 Cole, et al. Expires May 7, 2009 [Page 8]
Internet-Draft The SMF MIB November 2008 FROM SNMPv2-SMI -- [RFC2578] TruthValue FROM SNMPv2-TC -- [RFC2579] MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF -- [RFC2580] InterfaceIndex FROM IF-MIB -- [RFC2863] InetAddress, InetAddressType, InetAddressPrefixLength FROM INET-ADDRESS-MIB -- [RFC4001] ; manetSmfMIB MODULE-IDENTITY LAST-UPDATED "200811031300Z" -- November 03, 2008 ORGANIZATION "IETF MANET Working Group" CONTACT-INFO "WG E-Mail: manet@ietf.org WG Chairs: ian.chakeres@gmail.com jmacker@nrl.navy.mil Editors: Robert G. Cole Johns Hopkins University Applied Physics Lab and Department of Computer Science 11000 Johns Hopkins Road Room 02-257 Laurel, MD 22014 USA +1 443 778-6951 robert.cole@jhuapl.edu Joseph Macker Naval Research Laboratory Washington, D.C. 20375 USA macker@itd.nrl.navy.mil Brian Adamson Naval Research Laboratory Washington, D.C. 20375 USA adamson@itd.nrl.navy.mil Sean Harnedy Booz Allen Hamilton 333 City Boulevard West Cole, et al. Expires May 7, 2009 [Page 9]
Internet-Draft The SMF MIB November 2008 Orange, CA 92868 USA +1 714 938-3898 harnedy_sean@bah.com" DESCRIPTION "This MIB module contains managed object definitions for the Manet SMF RSSA process defined in: Macker, J.(ed.), Simplified Multicast Forwarding draft-ietf-manet-smf-07, February 25, 2008. Copyright (C) The IETF Trust (2008). This version of this MIB module is part of RFC xxxx; see the RFC itself for full legal notices." -- Revision History REVISION "200811031300Z" -- November 03, 2008 DESCRIPTION "Updated draft of this MIB module published as draft-cole-manet-smf-mib-01.txt. Added gateway filter table and reports capabilities following rmon." REVISION "200807071200Z" -- July 07, 2008 DESCRIPTION "Initial draft of this MIB module published as draft-cole-manet-smf-mib-00.txt." -- RFC-Editor assigns XXXX ::= { mib-2 998 } -- to be assigned by IANA -- -- Top-Level Object Identifier Assignments -- smfMIBNotifications OBJECT IDENTIFIER ::= { manetSmfMIB 0 } smfMIBObjects OBJECT IDENTIFIER ::= { manetSmfMIB 1 } smfMIBConformance OBJECT IDENTIFIER ::= { manetSmfMIB 2 } -- -- smfConfigurationGroup -- -- This group contains the SMF objects that configure specific -- options that determine the overall performance and operation -- of the multicast forwarding process for the router device -- and its interfaces. -- smfConfigurationGroup OBJECT IDENTIFIER ::= { smfMIBObjects 1 } smfOperationalMode OBJECT-TYPE Cole, et al. Expires May 7, 2009 [Page 10]
Internet-Draft The SMF MIB November 2008 SYNTAX INTEGER { withNHDP(1), cdsAwareRouting(2), crossLayer(3) } MAX-ACCESS read-write STATUS current DESCRIPTION "The SMF RSS node operational mode. The value withNHDP(1) indicates ... The value cdsAwareRouting(2) indicates ... The value crossLayer(3) indicates... ." ::= { smfConfigurationGroup 1 } -- -- Note: Would like to develop a capabilities Table listing -- the supported RSSA's. Need to figure out a good way to -- assciate specific RSSA algorithm configuration settings -- with the different RSSA's supported. This would replace -- the following smfRSSA, smfIpv4Dpd and smfIpv6Dpd objects. -- smfRssa OBJECT-TYPE SYNTAX INTEGER { cF(1), sMPR(2), eCDS(3), mprCDS(4) -- future(5-127) -- noStdAction(128-239) -- experimental(240-255) } MAX-ACCESS read-write STATUS current DESCRIPTION "The SMF RSS operational algorithm. The value cf(1) indicates ... The value experimental(240-255) indicates... ." ::= { smfConfigurationGroup 2 } smfRssMember OBJECT-TYPE SYNTAX INTEGER { potential(1), always(2), never(3) Cole, et al. Expires May 7, 2009 [Page 11]
Internet-Draft The SMF MIB November 2008 } MAX-ACCESS read-write STATUS current DESCRIPTION "The RSSA downselects a set of forwarders for multicast forwarding. Sometimes it is useful to force an agent to be included or excluded from the resulting RSS. This object is a switch to allow for this behavior. The value potential(1) allows the selected RSSA to determine if this agent is included or excluded from the RSS. The value always(1) forces the selected RSSA include this agent in the RSS. The value never(3) forces the selected RSSA to exclude this agent from the RSS." ::= { smfConfigurationGroup 3 } smfIpv4Dpd OBJECT-TYPE SYNTAX INTEGER { identificationBased(1), hashBased(2) } MAX-ACCESS read-write STATUS current DESCRIPTION "The current method for IPv4 duplicate packet detection. The value identificationBased(1) indicates... The value 'hashBased(2) indicates... ." ::= { smfConfigurationGroup 4 } smfIpv6Dpd OBJECT-TYPE SYNTAX INTEGER { identificationBased(1), hashBased(2) } MAX-ACCESS read-write STATUS current DESCRIPTION "The current method for IPv6 duplicate packet detection. The value identificationBased(1) Cole, et al. Expires May 7, 2009 [Page 12]
Internet-Draft The SMF MIB November 2008 indicates... The value 'hashBased(2) indicates... ." ::= { smfConfigurationGroup 5 } smfNhdpRssaMesgTLVIncluded OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-write STATUS current DESCRIPTION "Indicates whether the associated NHDP messages include the RSSA Message TLV, or not. This is an optional SMF operational setting. The value true(1) indicates that this TLV is included; the value false(2) indicates that it is not included." ::= { smfConfigurationGroup 6 } smfNhdpRssaAddrBlockTLVIncluded OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-write STATUS current DESCRIPTION "Indicates whether the associated NHDP messages include the RSSA Address Block TLV, or not. This is an optional SMF operational setting. The value true(1) indicates that this TLV is included; the value false(2) indicates that it is not included." ::= { smfConfigurationGroup 7 } smfNhdpRouterPriorityTLVIncluded OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-write STATUS current DESCRIPTION "Indicates whether the associated NHDP messages include the RSSA Router Priority TLV, or not. This is an optional SMF operational setting. The value true(1) indicates that this TLV is included; the value false(2) indicates that it is not included." ::= { smfConfigurationGroup 8 } -- -- SMF Gateway Filter Table -- Cole, et al. Expires May 7, 2009 [Page 13]
Internet-Draft The SMF MIB November 2008 smfGatewayFilterTable OBJECT-TYPE SYNTAX SEQUENCE OF SmfGatewayFilterEntry MAX-ACCESS not-accessible STATUS obsolete DESCRIPTION "The SMF Gateway can be configured to filter multicast packets into and outof the SMF MANET domain. This table defines the filter rules which define packet matching and related actions. The rules are in order ..." REFERENCE "The SMF draft." ::= { smfConfigurationGroup 9 } smfGatewayFilterEntry OBJECT-TYPE SYNTAX SmfGatewayFilterEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A single entry in the smfGatewayFilterTable." REFERENCE "The SMF draft." INDEX { smfGatewayFilterIf, smfGatewayFilterIfDirection } ::= { smfResponsibleAddrTable 1 } SmfResponsibleAddrEntry ::= SEQUENCE { smfGatewayFilterIf InterfaceIndex, smfGatewayFilterIfDirection INTEGER, smfGatewayFilterRuleRank INTEGER, smfGatewayFilterDestAddrType InetAddressType, smfGatewayFilterDestAddr InetAddress, smfGatewayFilterDestAddrPrefixLen InetAddressPrefixLength, smfGatewayFilterSrcAddrType InetAddressType, smfGatewayFilterSrcAddr InetAddress, smfGatewayFilterSrcAddrPrefixLen InetAddressPrefixLength, smfGatewayFilterProtocolNumber INTEGER, Cole, et al. Expires May 7, 2009 [Page 14]
Internet-Draft The SMF MIB November 2008 smfGatewayFilterDestPortNumber INTEGER, smfGatewayFilterAction INTEGER, smfGatewayFilterRowStatus RowStatus } smfGatewayFilterIfIndex OBJECT-TYPE SYNTAX InterfaceIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "The ifIndex for this node interface that is filtering this rule." ::= { smfGatewayFilterEntry 1 } smfGatewayFilterIfDirection OBJECT-TYPE SYNTAX INTEGER MAX-ACCESS not-accessible STATUS current DESCRIPTION "The ifIndex direction for this interface filtering rule." ::= { smfGatewayFilterEntry 2 } smfGatewayFilterRuleRank OBJECT-TYPE SYNTAX INTEGER MAX-ACCESS not-accessible STATUS current DESCRIPTION "The rank of the rule specified in this entry." REFERENCE "The SMF draft." ::= { smfGatewayFilterEntry 3 } smfGatewayFilterDestAddrType OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS not-accessible STATUS current DESCRIPTION "The type of the DestAddr, as defined in the InetAddress MIB [RFC 4001]." REFERENCE "The SMF draft." ::= { smfGatewayFilterEntry 4 } Cole, et al. Expires May 7, 2009 [Page 15]
Internet-Draft The SMF MIB November 2008 smfGatewayFilterDestAddr OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS not-accessible STATUS current DESCRIPTION "The destination IP address of this rule. The type of this address is determined by the value of the smfGatewayFilterDestAddrType object." REFERENCE "The SMF draft." ::= { smfGatewayFilterEntry 5 } smfGatewayFilterDestAddrPrefixLen OBJECT-TYPE SYNTAX InetAddressPrefixLength MAX-ACCESS not-accessible STATUS current DESCRIPTION "Indicates the number of leading one bits that form the mask to be logical-ANDed with the destination address before being compared to the value in the smfGatewayFilterDestAddr field." REFERENCE "The SMF draft." ::= { smfGatewayFilterEntry 6 } smfGatewayFilterSrcAddrType OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS not-accessible STATUS current DESCRIPTION "The type of the SrcAddr, as defined in the InetAddress MIB [RFC 4001]." REFERENCE "The SMF draft." ::= { smfGatewayFilterEntry 7 } smfGatewayFilterSrcAddr OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS not-accessible STATUS current DESCRIPTION "The source IP address of this rule. The type of this address is determined by the value of the smfGatewayFilterSrcAddrType object." REFERENCE "The SMF draft." ::= { smfGatewayFilterEntry 8 } Cole, et al. Expires May 7, 2009 [Page 16]
Internet-Draft The SMF MIB November 2008 smfGatewayFilterSrcAddrPrefixLen OBJECT-TYPE SYNTAX InetAddressPrefixLength MAX-ACCESS not-accessible STATUS current DESCRIPTION "Indicates the number of leading one bits that form the mask to be logical-ANDed with the destination address before being compared to the value in the smfGatewayFilterSrcAddr field." REFERENCE "The SMF draft." ::= { smfGatewayFilterEntry 9 } smfGatewayFilterSrcAddr OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS not-accessible STATUS current DESCRIPTION "The source IP address of this rule. The type of this address is determined by the value of the smfGatewayFilterSrcAddrType object." REFERENCE "The SMF draft." ::= { smfGatewayFilterEntry 10 } smfGatewayFilterProtocolNumber OBJECT-TYPE SYNTAX INTEGER MAX-ACCESS read-write STATUS current DESCRIPTION "The Protocol Number defined in RFC 5237." ::= { smfGatewayFilterEntry 11 } smfGatewayFilterDestPortNumber OBJECT-TYPE SYNTAX INTEGER MAX-ACCESS read-write STATUS current DESCRIPTION "The destination Port Number defined in RFC XXXX." ::= { smfGatewayFilterEntry 12 } smfGatewayFilterAction OBJECT-TYPE SYNTAX INTEGER MAX-ACCESS read-write STATUS current DESCRIPTION Cole, et al. Expires May 7, 2009 [Page 17]
Internet-Draft The SMF MIB November 2008 "The action to be taken if the rule is matched." RFC XXXX." ::= { smfGatewayFilterEntry 13 } smfGatewayFilterRowStatus OBJECT-TYPE SYNTAX RowStatus MAX-ACCESS read-create STATUS current DESCRIPTION "This object permits management of the table by facilitating actions such as row creation, construction, and destruction. The value of this object has no effect on whether other objects in this conceptual row can be modified." ::= { smfGatewayFilterEntry 14 } -- -- smfStateGroup -- -- Contains information describing the current state of the SMF -- process such as the current inclusion in the RS or not. -- smfStateGroup OBJECT IDENTIFIER ::= { smfMIBObjects 2 } smfNodeRsStatusIncluded OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-only STATUS current DESCRIPTION "The current status of the SMF node in the context of the MANETs relay set. A value of true(1) indicates that the node is currently part of the MANET Relay Set. A value of false(2) indicates that the node is currently not part of the MANET Relay Set." ::= { smfStateGroup 1 } -- -- SMF Neighbor Table -- smfNeighborTable OBJECT-TYPE SYNTAX SEQUENCE OF SmfNeighborEntry Cole, et al. Expires May 7, 2009 [Page 18]
Internet-Draft The SMF MIB November 2008 MAX-ACCESS not-accessible STATUS current DESCRIPTION "The SMF NeighborTable describes the current neighbor nodes, their address and SMF RSSA and the interface on which they can be reached." REFERENCE "Simplified Multicast Forwarding for MANET (SMF), Macker, J., February 2008. Section 7: SMF Neighborhood Discovery Requirements." ::= { smfStateGroup 2 } smfNeighborEntry OBJECT-TYPE SYNTAX SmfNeighborEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The SMF Neighbor Table contains the set of one-hop neighbors, the interface they are reachable on and the SMF RSSA they are currently running." INDEX { smfNeighborIpAddrType, smfNeighborIpAddr, smfNeighborPrefixLen } ::= { smfNeighborTable 1 } SmfNeighborEntry ::= SEQUENCE { smfNeighborIpAddrType InetAddressType, smfNeighborIpAddr InetAddress, smfNeighborPrefixLen InetAddressPrefixLength, smfNeighborRSSA INTEGER, smfNeighborNextHopInterface InterfaceIndex } smfNeighborIpAddrType OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS not-accessible STATUS current DESCRIPTION "The neighbor IP address type." Cole, et al. Expires May 7, 2009 [Page 19]
Internet-Draft The SMF MIB November 2008 ::= { smfNeighborEntry 1 } smfNeighborIpAddr OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS not-accessible STATUS current DESCRIPTION "The neighbor Inet IPv4 or IPv6 address." ::= { smfNeighborEntry 2 } smfNeighborPrefixLen OBJECT-TYPE SYNTAX InetAddressPrefixLength MAX-ACCESS not-accessible STATUS current DESCRIPTION "The prefix length. This is a decimal value that indicates the number of contiguous, higher-order bits of the address that make up the network portion of the address." ::= { smfNeighborEntry 3 } smfNeighborRSSA OBJECT-TYPE SYNTAX INTEGER { cF(1), sMPR(2), eCDS(3), mprCDS(4) -- future(5-127) -- noStdAction(128-239) -- experimental(240-255) } MAX-ACCESS read-only STATUS current DESCRIPTION "The current RSSA running on the neighbor. The list is identical to that described above for the smfRssa object." ::= { smfNeighborEntry 4 } smfNeighborNextHopInterface OBJECT-TYPE SYNTAX InterfaceIndex MAX-ACCESS read-only STATUS current DESCRIPTION "The interface ifIndex over which the neighbor is reachable in one-hop." ::= { smfNeighborEntry 5 } Cole, et al. Expires May 7, 2009 [Page 20]
Internet-Draft The SMF MIB November 2008 -- -- SMF Performance Group -- -- Contains objects which help to characterize the -- performance of the SMF RSSA process, such as statistics -- counters. There are two types of SMF RSSA statistics: -- global counters and per interface counters. -- smfPerformanceGroup OBJECT IDENTIFIER ::= { smfMIBObjects 3 } smfGlobalPerfGroup OBJECT IDENTIFIER ::= { smfPerformanceGroup 1 } -- -- Note: There may be other objects we wish to track. These may -- include counters of HASH collisions, metrics related -- to average, min or max number of neighbors, and other -- objects. These are TBD. -- smfMultiPktsRecvTotal OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "A counter of the total number of multicast IP packets received by the device." ::= { smfGlobalPerfGroup 1 } smfMultiPktsForwardedTotal OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "A counter of the total number of multicast IP packets forwarded by the device." ::= { smfGlobalPerfGroup 2 } smfDuplMultiPktsDetectedTotal OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "A counter of the total number of duplicate multicast IP packets detected by the device." Cole, et al. Expires May 7, 2009 [Page 21]
Internet-Draft The SMF MIB November 2008 ::= { smfGlobalPerfGroup 3 } smfDroppedMultiPktsTTLExceededTotal OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "A counter of the total number of dropped multicast IP packets by the device due to TTL exceeded." ::= { smfGlobalPerfGroup 4 } -- -- Per SMF Interface Performance Table -- smfInterfacePerfGroup OBJECT IDENTIFIER ::= {smfPerformanceGroup 2} smfInterfacePerfTable OBJECT-TYPE SYNTAX SEQUENCE OF SmfInterfacePerfEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The SMF Interface Performance Table describes the SMF statistics per interface." ::= { smfInterfacePerfGroup 1 } smfInterfacePerfEntry OBJECT-TYPE SYNTAX SmfInterfacePerfEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The SMF Interface Performance entry describes the statistics for a particular node interface." INDEX { smfIfPerfIfIndex } ::= { smfInterfacePerfTable 1 } SmfInterfacePerfEntry ::= SEQUENCE { smfIfPerfIfIndex InterfaceIndex, smfMultiPktsRecvPerIf Counter32, smfMultiPktsForwardedPerIf Counter32, Cole, et al. Expires May 7, 2009 [Page 22]
Internet-Draft The SMF MIB November 2008 smfDuplMultiPktsDetectedPerIf Counter32 } smfIfPerfIfIndex OBJECT-TYPE SYNTAX InterfaceIndex MAX-ACCESS not-accessible STATUS current DESCRIPTION "The ifIndex for this node interface that is collecting this set of performance management statistics." ::= { smfInterfacePerfEntry 1 } smfMultiPktsRecvPerIf OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "A counter of the number of multicast IP packets received by the device on this interface." ::= { smfInterfacePerfEntry 2 } smfMultiPktsForwardedPerIf OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "A counter of the number of multicast IP packets forwarded by the device on this interface." ::= { smfInterfacePerfEntry 3 } smfDuplMultiPktsDetectedPerIf OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "A counter of the number of duplicate multicast IP packets detected by the device on this interface." ::= { smfInterfacePerfEntry 4 } smfDroppedMultiPktsTTLExceededPerIf OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current Cole, et al. Expires May 7, 2009 [Page 23]
Internet-Draft The SMF MIB November 2008 DESCRIPTION "A counter of the number of dropped multicast IP packets by the device on this interface due to TTL exceeded." ::= { smfInterfacePerfEntry 5 } -- -- Reports Control -- This and the following tables are modeled -- after the report control and collection -- capabilities found in RMON II, RFC XXXX -- -- Note: Starting down this road only for general performance -- measures first. If desireable, then will add reports for -- IF specific measurements. -- smfReportsGroup OBJECT IDENTIFIER ::= { smfMIBObjects 4 } smfGenReportCntrlTable OBJECT-TYPE SYNTAX SEQUENCE OF SmfGenReportCntrlEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The smfGenReportCntrlTable is the controlling entry that manages the population of studies in the Report for selected time intervals. Note that this is not like the typical RMON controlTable and dataTable in which each entry creates its own data table. Each entry in this table enables the creation of multiple data tables on a study basis. For each interval, the study is updated in place, and the current data content of the table becomes invalid. The control table entries are persistent across system reboots." ::= { smfReportsGroup 1 } smfGenReportCntrlEntry OBJECT-TYPE SYNTAX SmfGenReportCntrlEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "A conceptual row in the smfGenReportCntrlTable. Cole, et al. Expires May 7, 2009 [Page 24]
Internet-Draft The SMF MIB November 2008 An example of the indexing of this entry is smfGenReportCntrInterval.1" INDEX { smfGenReportCntrlIndex } ::= { smfGenReportCntrlTable 1 } SmfGenReportCntrlEntry ::= SEQUENCE { smfGenReportCntrlIndex Unsigned32, smfGenReportCntrlInterval Unsigned32, smfGenReportCntrlReqSize Unsigned32, smfGenReportCntrlGrantedSize Unsigned32, smfGenReportCntrlReqReports Unsigned32, smfGenReportCntrlGrantedReports Unsigned32, smfGenReportCntrlStartTime TimeStamp, smfGenReportCntrlReportNumber Unsigned32, smfGenReportCntrlInsertsDenied Counter32, smfGenReportCntrlOwner OwnerString, smfGenReportCntrlStorageType StorageType, smfGenReportCntrlStatus RowStatus } smfGenReportCntrlIndex OBJECT-TYPE SYNTAX Unsigned32 (1..65535) MAX-ACCESS not-accessible STATUS current DESCRIPTION "An index that uniquely identifies an entry in the smfGenReportCntrlTable. Each such entry defines a unique report whose results are placed in the smfGenReportTable on behalf of this smfGenReportCntrlEntry." ::= { smfGenReportCntrlEntry 1 } smfGenReportCntrlInterval OBJECT-TYPE SYNTAX Unsigned32 UNITS "Seconds" MAX-ACCESS read-create STATUS current DESCRIPTION "The interval in seconds over which data is accumulated before being aggregated into a report in the smfGenReportTable. All reports with the same smfGenReportCntrlIndex will be based on the same interval. This object may not be modified if the associated smfGenReportCntrlStatus object is equal to active(1)." DEFVAL { 3600 } ::= { smfGenReportCntrlEntry 2 } Cole, et al. Expires May 7, 2009 [Page 25]
Internet-Draft The SMF MIB November 2008 smfGenReportCntrlReqSize OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-create STATUS current DESCRIPTION "The maximum number of Client and Server combination entries requested for this report. When this object is created or modified, the probe should set smfGenReportCntrlGrantedSize as closely to this object as is possible for the particular probe implementation and available resources. It is important to note that this value is the number of requested entries in the smfGenReportTable only. This object may not be modified if the associated smfGenReportCntrlStatus object is equal to active(1)." ::= { smfGenReportCntrlEntry 3 } smfGenReportCntrlGrantedSize OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The maximum number of performance entries in this report. When the associated smfGenReportCntrlReqSize object is created or modified, the probe should set this object as closely to the requested value as is possible for the particular implementation and available resources. The probe must not lower this value except as a result of a set to the associated smfGenReportCntrlReqSize object. It is an implementation-specific matter as to whether zero-valued entries are available." ::= { smfGenReportCntrlEntry 4 } smfGenReportCntrlReqReports OBJECT-TYPE SYNTAX Unsigned32 (1..65535) MAX-ACCESS read-create STATUS current DESCRIPTION "The number of saved reports requested to be allocated on behalf of this entry. This object may not be modified if the associated Cole, et al. Expires May 7, 2009 [Page 26]
Internet-Draft The SMF MIB November 2008 smfGenReportCntrlStatus object is equal to active(1)." ::= { smfGenReportCntrlEntry 5 } smfGenReportCntrlGrantedReports OBJECT-TYPE SYNTAX Unsigned32 (0..65535) MAX-ACCESS read-only STATUS current DESCRIPTION "The number of saved reports the agent has allocated based on the requested amount in smfGenReportCntrlReqReports. Because each report can have many entries, the total number of entries allocated will be this number multiplied by the value of smfGenReportCntrlGrantedSize, or by 1 if that object doesn't exist. When the associated smfGenReportCntrlReqReports object is created or modified, the agent should set this object as closely to the requested value as is possible for the particular implementation and available resources. When considering available resources, the agent must consider its ability to allocate this many reports, each with the number of entries represented by smfGenReportCntrlGrantedSize, or by 1 if that object doesn't exist. Note that although the storage required for each report may fluctuate due to changing conditions, the agent must continue to have storage available to satisfy the full report size for all reports, when necessary. Further, the agent must not lower this value except as a result of a set to the associated smfGenReportCntrlReqSize object." ::= { smfGenReportCntrlEntry 6 } smfGenReportCntrlStartTime OBJECT-TYPE SYNTAX TimeStamp MAX-ACCESS read-only STATUS current DESCRIPTION "The value of sysUpTime when the system began processing the report in progress. Note that the report in progress is not available. This object may be used by the management station to figure out the start time for all previous reports saved for this smfGenReportCntrlEntry, as reports are started at fixed intervals." ::= { smfGenReportCntrlEntry 7 } smfGenReportCntrlReportNumber OBJECT-TYPE Cole, et al. Expires May 7, 2009 [Page 27]
Internet-Draft The SMF MIB November 2008 SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The number of the report in progress. When an smfGenReportCntrlEntry is activated, the first report will be numbered zero." ::= { smfGenReportCntrlEntry 8 } smfGenReportCntrlInsertsDenied OBJECT-TYPE SYNTAX Counter32 MAX-ACCESS read-only STATUS current DESCRIPTION "The number of attempts to add an entry to reports for this SmfGenReportCntrlEntry that failed because the number of entries would have exceeded smfGenReportCntrlGrantedSize. This number is valuable in determining if enough entries have been allocated for reports in light of fluctuating network usage. Note that an entry that is denied will often be attempted again, so this number will not predict the exact number of additional entries needed, but it can be used to understand the relative magnitude of the problem. Also note that there is no ordering specified for the entries in the report; thus, there are no rules for which entries will be omitted when not enough entries are available. As a consequence, the agent is not required to delete 'least valuable' entries first." ::= { smfGenReportCntrlEntry 9 } smfGenReportCntrlOwner OBJECT-TYPE SYNTAX OwnerString MAX-ACCESS read-create STATUS current DESCRIPTION "The entity that configured this entry and is therefore using the resources assigned to it. This object may not be modified if the associated smfGenReportCntrlStatus object is equal to active(1)." ::= { smfGenReportCntrlEntry 10 } smfGenReportCntrlStorageType OBJECT-TYPE SYNTAX StorageType MAX-ACCESS read-create STATUS current Cole, et al. Expires May 7, 2009 [Page 28]
Internet-Draft The SMF MIB November 2008 DESCRIPTION "The storage type of this smfGenReportCntrlEntry. If the value of this object is 'permanent', no objects in this row need to be writable." ::= { smfGenReportCntrlEntry 11 } smfGenReportCntrlStatus OBJECT-TYPE SYNTAX RowStatus MAX-ACCESS read-create STATUS current DESCRIPTION "The status of this performance control entry. An entry may not exist in the active state unless each object in the entry has an appropriate value. Once this object is set to active(1), no objects in the smfGenReportCntrlTable can be changed. If this object is not equal to active(1), all associated entries in the smfGenReportTable shall be deleted." ::= { smfGenReportCntrlEntry 12 } -- -- Reports -- smfGenReportTable OBJECT-TYPE SYNTAX SEQUENCE OF SmfGenReportEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "This table contains studies for each of the control table entries in smfGenReportCntrlTable. These studies are provided based on the selections and parameters found for the entry in the smfGenReportCntrlTable. The performance counter are the same as those specified in the smfPerformanceGroup." ::= { smfReportsGroup 2 } smfGenReportEntry OBJECT-TYPE SYNTAX SmfGenReportEntry MAX-ACCESS not-accessible STATUS current Cole, et al. Expires May 7, 2009 [Page 29]
Internet-Draft The SMF MIB November 2008 DESCRIPTION "A conceptual row in the smfGenReportTable. The smfGenReportCntrlIndex value in the index identifies the smfGenReportCntrlEntry on whose behalf this entry was created. The smfGenReportIndex value in the index identifies which report (in the series of reports) this entry is a part of. An example of the indexing of this entry is smfGenReportMultiPktsForwarded.3.15" INDEX { smfGenReportCntrlIndex, smfGenReportIndex } ::= { smfGenReportTable 1 } SmfGenReportEntry ::= SEQUENCE { smfGenReportIndex Unsigned32, smfGenReportMultiPktsRecvTot ZeroBasedCounter32, smfGenReportMultiPktsForwardedTot ZeroBasedCounter32, smfGenReportDuplMultiPktsDetected ZeroBasedCounter32, } smfGenReportIndex OBJECT-TYPE SYNTAX Unsigned32 (1..2147483647) MAX-ACCESS not-accessible STATUS current DESCRIPTION "The value of smfGenReportCntrlNumber for the report to which this entry belongs." ::= { smfGenReportEntry 1 } smfGenReportMultiPktsRecvTot OBJECT-TYPE SYNTAX ZeroBasedCounter32 MAX-ACCESS read-only STATUS current DESCRIPTION "The count of the total number of ...." ::= { smfGenReportEntry 2 } smfGenReportMultiPktsForwardedTot OBJECT-TYPE SYNTAX ZeroBasedCounter32 MAX-ACCESS read-only STATUS current DESCRIPTION "The count of the total number of ...." ::= { smfGenReportEntry 3 } Cole, et al. Expires May 7, 2009 [Page 30]
Internet-Draft The SMF MIB November 2008 smfGenReportDuplMultiPktsDetectedTot OBJECT-TYPE SYNTAX ZeroBasedCounter32 MAX-ACCESS read-only STATUS current DESCRIPTION "The count of the total number of ...." ::= { smfGenReportEntry 4 } smfGenReportDroppedMultiPktsTTLExceededTot OBJECT-TYPE SYNTAX ZeroBasedCounter32 MAX-ACCESS read-only STATUS current DESCRIPTION "The count of the total number of ...." ::= { smfGenReportEntry 5 } -- -- Notifications -- -- Note: What notifications do we want for this MIB? -- -- Compliance Statements -- -- Note: need to update the Compliance section once the mib -- objects stablize. smfCompliances OBJECT IDENTIFIER ::= { smfMIBConformance 1 } smfMIBGroups OBJECT IDENTIFIER ::= { smfMIBConformance 2 } smfBasicCompliance MODULE-COMPLIANCE STATUS current DESCRIPTION "The basic implementation requirements for managed network entities that implement the SMF RSSA process." MODULE -- this module MANDATORY-GROUPS { smfConfigObjectsGroup } ::= { smfCompliances 1 } smfFullCompliance MODULE-COMPLIANCE STATUS current DESCRIPTION "The full implementation requirements for Cole, et al. Expires May 7, 2009 [Page 31]
Internet-Draft The SMF MIB November 2008 managed network entities that implement the SMF RSSA process." MODULE -- this module MANDATORY-GROUPS { smfConfigObjectsGroup, smfStateObjectsGroup, smfPerfObjectsGroup } ::= { smfCompliances 2 } -- -- Units of Conformance -- smfConfigObjectsGroup OBJECT-GROUP OBJECTS { smfOperationalMode, smfRssa, smfIpv4Dpd, smfIpv6Dpd, smfNhdpRssaMesgTLVIncluded, smfNhdpRssaAddrBlockTLVIncluded, smfNhdpRouterPriorityTLVIncluded } STATUS current DESCRIPTION "Set of SMF configuration objects implemented in this module." ::= { smfMIBGroups 1 } smfStateObjectsGroup OBJECT-GROUP OBJECTS { smfNodeRsStatusIncluded, smfNeighborRSSA, smfNeighborNextHopInterface } STATUS current DESCRIPTION "Set of SMF state objects implemented in this module." ::= { smfMIBGroups 2 } smfPerfObjectsGroup OBJECT-GROUP OBJECTS { smfMultiPktsRecvTotal, smfMultiPktsForwardedTotal, smfDuplMultiPktsDetectedTotal, smfDroppedMultiPktsTTLExceededTotal, smfMultiPktsRecvPerIf, smfMultiPktsForwardedPerIf, Cole, et al. Expires May 7, 2009 [Page 32]
Internet-Draft The SMF MIB November 2008 smfDuplMultiPktsDetectedPerIf, smfDroppedMultiPktsTTLExceededPerIf } STATUS current DESCRIPTION "Set of SMF performance objects implemented in this module by total and per interface." ::= { smfMIBGroups 3 } END 8. Security Considerations [TODO] Each specification that defines one or more MIB modules MUST contain a section that discusses security considerations relevant to those modules. This section MUST be patterned after the latest approved template (available at http://www.ops.ietf.org/mib-security.html). Remember that the objective is not to blindly copy text from the template, but rather to think and evaluate the risks/vulnerabilities and then state/ document the result of this evaluation. [TODO] if you have any read-write and/or read-create objects, please include the following boilerplate paragraph. There are a number of management objects defined in this MIB module with a MAX-ACCESS clause of read-write and/or read-create. Such objects may be considered sensitive or vulnerable in some network environments. The support for SET operations in a non-secure environment without proper protection can have a negative effect on network operations. These are the tables and objects and their sensitivity/vulnerability: o [TODO] writeable MIB objects that could be especially disruptive if abused MUST be explicitly listed by name and the associated security risks MUST be spelled out; RFC 2669 has a very good example. o [TODO] list the writable tables and objects and state why they are sensitive. [TODO] else if there are no read-write objects in your MIB module, use the following boilerplate paragraph. There are no management objects defined in this MIB module that have a MAX-ACCESS clause of read-write and/or read-create. So, if this MIB module is implemented correctly, then there is no risk that an Cole, et al. Expires May 7, 2009 [Page 33]
Internet-Draft The SMF MIB November 2008 intruder can alter or create any management objects of this MIB module via direct SNMP SET operations. [TODO] if you have any sensitive readable objects, please include the following boilerplate paragraph. Some of the readable objects in this MIB module (i.e., objects with a MAX-ACCESS other than not-accessible) may be considered sensitive or vulnerable in some network environments. It is thus important to control even GET and/or NOTIFY access to these objects and possibly to even encrypt the values of these objects when sending them over the network via SNMP. These are the tables and objects and their sensitivity/vulnerability: o [TODO] you must explicitly list by name any readable objects that are sensitive or vulnerable and the associated security risks MUST be spelled out (for instance, if they might reveal customer information or violate personal privacy laws such as those of the European Union if exposed to unauthorized parties) o [TODO] list the tables and objects and state why they are sensitive. [TODO] discuss what security the protocol used to carry the information should have. The following three boilerplate paragraphs should not be changed without very good reason. Changes will almost certainly require justification during IESG review. SNMP versions prior to SNMPv3 did not include adequate security. Even if the network itself is secure (for example by using IPSec), even then, there is no control as to who on the secure network is allowed to access and GET/SET (read/change/create/delete) the objects in this MIB module. It is RECOMMENDED that implementers consider the security features as provided by the SNMPv3 framework (see [RFC3410], section 8), including full support for the SNMPv3 cryptographic mechanisms (for authentication and privacy). Further, deployment of SNMP versions prior to SNMPv3 is NOT RECOMMENDED. Instead, it is RECOMMENDED to deploy SNMPv3 and to enable cryptographic security. It is then a customer/operator responsibility to ensure that the SNMP entity giving access to an instance of this MIB module is properly configured to give access to the objects only to those principals (users) that have legitimate rights to indeed GET or SET (change/create/delete) them. Cole, et al. Expires May 7, 2009 [Page 34]
Internet-Draft The SMF MIB November 2008 9. IANA Considerations [TODO] In order to comply with IESG policy as set forth in http://www.ietf.org/ID-Checklist.html, every Internet-Draft that is submitted to the IESG for publication MUST contain an IANA Considerations section. The requirements for this section vary depending what actions are required of the IANA. see RFC4181 section 3.5 for more information on writing an IANA clause for a MIB module document. [TODO] select an option and provide the necessary details. Option #1: The MIB module in this document uses the following IANA-assigned OBJECT IDENTIFIER values recorded in the SMI Numbers registry: Descriptor OBJECT IDENTIFIER value ---------- ----------------------- sampleMIB { mib-2 XXX } Option #2: Editor's Note (to be removed prior to publication): the IANA is requested to assign a value for "XXX" under the 'mib-2' subtree and to record the assignment in the SMI Numbers registry. When the assignment has been made, the RFC Editor is asked to replace "XXX" (here and in the MIB module) with the assigned value and to remove this note. Note well: prior to official assignment by the IANA, a draft document MUST use placeholders (such as "XXX" above) rather than actual numbers. See RFC4181 Section 4.5 for an example of how this is done in a draft MIB module. Option #3: This memo includes no request to IANA. 10. Contributors This MIB document uses the template authored by D. Harrington which is based on contributions from the MIb Doctors, especially Juergen Schoenwaelder, Dave Perkins, C.M.Heard and Randy Presuhn. Cole, et al. Expires May 7, 2009 [Page 35]
Internet-Draft The SMF MIB November 2008 11. Acknowledgements 12. References 12.1. Normative References [RFC2863] McCloghrie, K. and F. Kastenholz, "The Interfaces Group MIB", RFC 2863, June 2000. [RFC3418] Presuhn, R., "Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)", STD 62, RFC 3418, December 2002. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC2578] McCloghrie, K., Ed., Perkins, D., Ed., and J. Schoenwaelder, Ed., "Structure of Management Information Version 2 (SMIv2)", STD 58, RFC 2578, April 1999. [RFC2579] McCloghrie, K., Ed., Perkins, D., Ed., and J. Schoenwaelder, Ed., "Textual Conventions for SMIv2", STD 58, RFC 2579, April 1999. [RFC2580] McCloghrie, K., Perkins, D., and J. Schoenwaelder, "Conformance Statements for SMIv2", STD 58, RFC 2580, April 1999. [I-D.ietf-manet-smf] Macker, J. and S. Team, "Simplified Multicast Forwarding for MANET", draft-ietf-manet-smf-07 (work in progress), February 2008. 12.2. Informative References [RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart, "Introduction and Applicability Statements for Internet-Standard Management Framework", RFC 3410, December 2002. Appendix A. Change Log Not applicable to draft 00 1. Cole, et al. Expires May 7, 2009 [Page 36]
Internet-Draft The SMF MIB November 2008 Appendix B. Open Issues This section contains the set of open issues related to the development and design of the SMF-MIB. This section will not be present in the final version of the MIB and will be removed once all the open issues have been resolved. 1. Clarify handling of the NHDP TLV message inclusions? 2. Can we develop a capabilities table for the supported RSSA algorithms? And, if so, can each supportted RSSA have a different set of configuration parameters? 3. Is the Gateway Filter table appropriate for this MIB or should it be handled in a seperate MIB worked elsewhere? How should this table be indexed and how should it represent the ordering of the rules (or chains)? Should this be greatly simplified? How do we handle null values in the rules? 4. What are the additional performance objects to be included, e.g., Hash collisions, max, min and average neighbor set? How would average be determined? 5. Is it useful to track the effectiveness of the coverage of the current RSSA? Is it possible to track this? 6. Complete notification group. 7. Complete conformance group. 8. Work on the relationship to other MIBs, IF-MIB, NHDP-MIB. 9. Identify all objects requiring non-volatile storage in their DESCRIPTION clauses. 10. Incorporate parameter relationship conditions into their DESCRIPTION clauses. 11. Complete the security analysis and section. 12. Cleanup all the [TODOs] from the MIB template. Cole, et al. Expires May 7, 2009 [Page 37]
Internet-Draft The SMF MIB November 2008 *************************************************************** * Note to the RFC Editor (to be removed prior to publication) * * * * 1) The reference to RFCXXXX within the DESCRIPTION clauses * * of the MIB module point to this draft and are to be * * assigned by the RFC Editor. * * * * 2) The reference to RFCXXX2 throughout this document point * * to the current draft-ietf-manet-smf-xx.txt. This * * need to be replaced with the XXX RFC number. * * * *************************************************************** Authors' Addresses Robert G. Cole Johns Hopkins University 11100 Johns Hopkins Road, Room 257 Laurel, Maryland 21073 USA Phone: +1 443 778 6951 EMail: robert.cole@jhuapl.edu URI: http://www.cs.jhu.edu/~rgcole/ Joseph Macker Navy Research Laboratory XXX Street Washington, D.C. 20375 USA Phone: +1 xxx xxx-xxxx EMail: macker@itd.nrl.navy.mil Brian Adamson Navy Research Laboratory XXX Street Washington, D.C. 20375 USA Phone: +1 xxx xxx-xxxx EMail: adamson@itd.nrl.navy.mil Cole, et al. Expires May 7, 2009 [Page 38]
Internet-Draft The SMF MIB November 2008 Sean Harnedy Booz Allen Hamilton 333 City Boulevard West Orange, CA 92868 USA Phone: +1 xxx xxx-xxxx EMail: harnedy_sean@bah.com Cole, et al. Expires May 7, 2009 [Page 39]
Internet-Draft The SMF MIB November 2008 Full Copyright Statement Copyright (C) The IETF Trust (2008). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Acknowledgement Funding for the RFC Editor function is provided by the IETF Administrative Support Activity (IASA). Cole, et al. Expires May 7, 2009 [Page 40]