628 lines
27 KiB
Plaintext
628 lines
27 KiB
Plaintext
|
|
-- Copyright 1995 by 3Com Corporation. All rights reserved.
|
|
-- MIB file name: a3Com-ipso
|
|
-- available in these 3Com devices: NETBuilder bridge/routers
|
|
-- For support or more info, check 3Com's web page at http://www.3com.com
|
|
|
|
A3Com-IPSO-r1-MIB DEFINITIONS ::= BEGIN
|
|
|
|
IMPORTS
|
|
enterprises
|
|
FROM RFC1155-SMI
|
|
OBJECT-TYPE
|
|
FROM RFC-1212;
|
|
|
|
--
|
|
-- This MIB is for 3Com systems that support IP security options
|
|
--
|
|
--
|
|
|
|
a3Com OBJECT IDENTIFIER ::= { enterprises 43 }
|
|
brouterMIB OBJECT IDENTIFIER ::= { a3Com 2 }
|
|
a3ComIPSO OBJECT IDENTIFIER ::= { brouterMIB 12 }
|
|
|
|
RowStatus ::= INTEGER {
|
|
-- the following two values are states
|
|
-- these values can be read or written
|
|
active(1),
|
|
notInService(2),
|
|
|
|
-- the following value is a state:
|
|
-- this value may be read, but not written
|
|
notReady(3),
|
|
|
|
-- the following three values are actions
|
|
-- these values can be written, but are never read
|
|
createAndGo(4),
|
|
createAndWait(5),
|
|
destroy(6)
|
|
}
|
|
|
|
--This data type, which has the same semantics as the RowStatus
|
|
--textual convention used in SNMPv2, is used to add and
|
|
--delete entries from a table.
|
|
--
|
|
--The tables in this MIB allow a subset of the functionality
|
|
--provided by the RowStatus textual convention. In particular
|
|
--row creation is allowed using only the createAndGo method.
|
|
--
|
|
--That is, when adding entries to this table, this object
|
|
--must be set to createAndGo(4). The instance identifier
|
|
--for this object will define the values of the columns
|
|
--that make up the index.
|
|
--
|
|
--In the same PDU, the appropriate remaining columns
|
|
--of that row must be set as well. The agent
|
|
--will immediately set the value of this object to
|
|
--active(1) if the row is correct. If not, the agent
|
|
--will refuse the SET request and return an
|
|
--error code.
|
|
--
|
|
--To modify an existing entry, it must be removed
|
|
--an another entry with the desired changes added.
|
|
--
|
|
--To remove an entry, set the value of this object
|
|
--to destroy(6).
|
|
|
|
|
|
|
|
a3IPsecureCtl OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
security1108 (1),
|
|
security1038 (2),
|
|
noSecurity (3)
|
|
}
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This object determines whether this system checks
|
|
for IP security options. If this object has the value
|
|
security1108 (1), then the system checks for IP security
|
|
options (per rfc1108) in each received IP packet and handles
|
|
them accordingly. If this object has the value security1038 (2),
|
|
then the system checks and acts on IP security options per
|
|
rfc1038. If this object has the value noSecurity (3), the
|
|
system does not check for IP security options."
|
|
DEFVAL { noSecurity }
|
|
::= { a3ComIPSO 1 }
|
|
|
|
a3IPsecureFileServer OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
yes (1),
|
|
no (2)
|
|
}
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This determines whether security options are processed
|
|
when talking to the host identified by the UI parameter
|
|
FileServerAddr. If set to yes (1), the File Server is
|
|
treated like any other host on the network. If set to
|
|
no (2), the File Server is treated specially. Any security
|
|
options received from this IP address are ignored. Also, all
|
|
basic security options are stripped before sending a packet
|
|
to the File Server."
|
|
DEFVAL { no }
|
|
::= { a3ComIPSO 2 }
|
|
|
|
--
|
|
-- This next table contains port specific IP security parameters
|
|
--
|
|
|
|
a3IPsecureParamTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF A3IPsecureParamEntry
|
|
ACCESS not-accessible
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This table contains a set of parameters relating
|
|
to the configuration of IP security options."
|
|
REFERENCE
|
|
"RFC 1108, Security Options for the Internet Protocol."
|
|
::= { a3ComIPSO 3 }
|
|
|
|
a3IPsecureParamEntry OBJECT-TYPE
|
|
SYNTAX A3IPsecureParamEntry
|
|
ACCESS not-accessible
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"Each entry in this table contains a set of IP security
|
|
parameters specific to a particular port."
|
|
INDEX { a3IPsecureParamPortIndex }
|
|
::= { a3IPsecureParamTable 1 }
|
|
|
|
A3IPsecureParamEntry ::=
|
|
SEQUENCE {
|
|
a3IPsecureParamPortIndex INTEGER,
|
|
a3IPsecureParamCtl INTEGER,
|
|
a3IPsecureLabelDefaultLevel INTEGER,
|
|
a3IPsecureLabelDefaultAuth INTEGER,
|
|
a3IPsecureLabelSysLevel INTEGER,
|
|
a3IPsecureLabelSysAuth INTEGER,
|
|
a3IPsecureMinLevel INTEGER,
|
|
a3IPsecureMaxLevel INTEGER
|
|
}
|
|
|
|
a3IPsecureParamPortIndex OBJECT-TYPE
|
|
SYNTAX INTEGER
|
|
ACCESS read-only
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This identifies the IP port to which the security
|
|
parameters in this entry apply."
|
|
::= { a3IPsecureParamEntry 1 }
|
|
|
|
a3IPsecureParamCtl OBJECT-TYPE
|
|
SYNTAX INTEGER
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This object controls a number of parameters associated
|
|
with IP security. Each parameter is represented by
|
|
a specific bit. If the bit is set, the parameter is
|
|
turned on. If the bit is not set, the parameter is
|
|
turned off. The state of all the parameters is represented
|
|
by a sum of all the bits, the value of each bit being
|
|
multiplied by 2 raised to the power of the position
|
|
of the bit in the integer.
|
|
|
|
With bit 0 being the least significant bit, the table
|
|
below defines the mapping of security parameters to bits.
|
|
|
|
bit # Parameter
|
|
0 Extended
|
|
1 BasicFirst
|
|
2 LabelAdd
|
|
3 LabelStrip
|
|
|
|
If bit 0 is set, the Extended parameter is turned on.
|
|
This allows datagrams with extended security options to be
|
|
received and/or transmitted from this port.
|
|
|
|
If bit 1 is set, the BasicFirst parameter is turned on. This
|
|
indicates that the basic security option is always transmitted
|
|
as the first option in the datagram, even if the packet
|
|
has to be rearranged. If this bit is not set, the datagram
|
|
options are sent as is.
|
|
|
|
If bit 2 is set, the LabelAdd parameter is turned on. This
|
|
ensures that all datagrams leaving this port have a label
|
|
attached to them. If an outgoing datagram does not have
|
|
a label, the default label, computed for the datagram
|
|
on receipt, is attached to it before transmission. If this
|
|
parameter is turned off, then datagrams without labels are
|
|
allowed to be transmitted, and the default label is not
|
|
attached to the datagram.
|
|
|
|
If bit 3 is set, the LabelStrip parameter is turned on. In
|
|
this case, any basic security option present in the datagram
|
|
is stripped before transmission through this port. The
|
|
stripping is done after all the security processing has been
|
|
done. If this parameter is turned off, the label is transmitted
|
|
as is."
|
|
DEFVAL { 0 }
|
|
::= { a3IPsecureParamEntry 2 }
|
|
|
|
a3IPsecureLabelDefaultLevel OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
none (1),
|
|
topSecret (2),
|
|
secret (3),
|
|
confidential (4),
|
|
unclassified (5)
|
|
}
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This parameter applies to packets received over this port
|
|
that have no classification level or authority flags.
|
|
When such packets are received, the value of this parameter
|
|
determines the IP security level that is attached to the
|
|
packet before any processing is done.
|
|
|
|
If this is set to none (1), any packet that is received
|
|
without a security level defined in the IP header options
|
|
is discarded.
|
|
|
|
If this is set to any other value, any packet received
|
|
without a security level defined in the IP header options
|
|
will have one added according to the value of this object.
|
|
A Protection Authority field will also be added to these
|
|
packets. The contents of the field is determined by the
|
|
value of a3IPsecureLabelDefaultAuth.
|
|
|
|
Note, this does not imply that the label will be automatically
|
|
attached to the packet on transmission. This is controlled
|
|
by the value of a3IPsecureParamCtl -- specifically, the value
|
|
of the LabelAdd bit"
|
|
DEFVAL { none }
|
|
::= { a3IPsecureParamEntry 3 }
|
|
|
|
a3IPsecureLabelDefaultAuth OBJECT-TYPE
|
|
SYNTAX INTEGER
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"Like a3IPsecureLabelDefaultLevel, this parameter applies
|
|
only to packets received over this port that have no
|
|
classification level or authority flags. When such
|
|
packets are received, the value of this parameter determines
|
|
the Protection Authority flag field that is attached to
|
|
the packet before any processing is done.
|
|
|
|
The individual Protection Authority flags that are included
|
|
are determined by the individual bits that are set
|
|
in the value of this object, with the two least significant
|
|
bytes being of interest. Starting from bit 7 of the
|
|
INTEGER (with the least significant bit being numbered 0),
|
|
the mapping of bits to Protection Authority flags is as
|
|
follows (note: rfc1108 labels the most significant bit '0',
|
|
the next most significant bit '1', etc),
|
|
|
|
bit# Prot. Auth. Flag
|
|
7 GENSER
|
|
6 SIOP
|
|
5 SCI
|
|
4 NSA
|
|
3 DOE
|
|
|
|
While only bits 7 through 3 have specific Protection Authority
|
|
flags assigned to them, any 2 byte combination of bits may be
|
|
set as long as that combination is allowed by rfc1108. The
|
|
same 1 or 2 byte pattern of bits identified by the value of this
|
|
object will be placed in the Protection Authority field of
|
|
received packets with no IP security options present. (note:
|
|
this is conditioned on a3IPsecureLabelDefaultLevel for this
|
|
port having a value other than none (1).)
|
|
|
|
If this object has the value 0, then no Protection Authority
|
|
field will be added to any received packets, regardless of the
|
|
value of a3IPsecureLabelDefaultLevel."
|
|
DEFVAL { 0 }
|
|
::= { a3IPsecureParamEntry 4 }
|
|
|
|
a3IPsecureLabelSysLevel OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
none (1),
|
|
topSecret (2),
|
|
secret (3),
|
|
confidential (4),
|
|
unclassified (5)
|
|
}
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This parameter applies to packets originated by this system
|
|
and sent over this port. When such packets are sent, the
|
|
value of this parameter determines the IP security level that
|
|
is attached to the packet before any processing is done.
|
|
|
|
If this is set to none (1), no IP security information
|
|
is added to these packets.
|
|
|
|
If this is set to any other value, any packet originated
|
|
by this system and sent over this port will have an IP security
|
|
level added according to the value of this object.
|
|
A Protection Authority field will also be added to these
|
|
packets. The contents of the field is determined by the
|
|
value of a3IPsecureLabelSysAuth.
|
|
|
|
The security level and Protection Authority flag field
|
|
must form a label which is legal for transmission on this
|
|
port. The range of legal values for the security level is
|
|
defined by a3IPsecureMaxLevel and a3IPsecureMinLevel.
|
|
The set of legal Protection Authority flags is determined
|
|
by the entries in a3IPsecureAuthOutTable."
|
|
DEFVAL { unclassified }
|
|
::= { a3IPsecureParamEntry 5 }
|
|
|
|
a3IPsecureLabelSysAuth OBJECT-TYPE
|
|
SYNTAX INTEGER
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"Like a3IPsecureLabelSysLevel, this parameter applies
|
|
only to packets originated by this system and sent over
|
|
this port. When such packets are sent, the value of this
|
|
parameter determines the Protection Authority flag field
|
|
that is attached to the packet before any processing is
|
|
done. Note, this is assuming a3IPsecureLabelSysLevel has
|
|
a value other than none (1).
|
|
|
|
The individual Protection Authority flags that are included
|
|
are determined by the individual bits that are set
|
|
in the value of this object, with the two least significant
|
|
bytes being of interest. Starting from bit 7 of the
|
|
INTEGER (with the least significant bit being numbered 0),
|
|
the mapping of bits to Protection Authority flags is as
|
|
follows (note: rfc1108 labels the most significant bit '0',
|
|
the next most significant bit '1', etc),
|
|
|
|
bit# Prot. Auth. Flag
|
|
7 GENSER
|
|
6 SIOP
|
|
5 SCI
|
|
4 NSA
|
|
3 DOE
|
|
|
|
While only bits 7 through 3 have specific Protection Authority
|
|
flags assigned to them, any 2 byte combination of bits may be
|
|
set as long as that combination is allowed by rfc1108. The
|
|
same 1 or 2 byte pattern of bits identified by the value of this
|
|
object will be placed in the Protection Authority field of
|
|
received packets with no IP security options present. (note:
|
|
this is conditioned on a3IPsecureLabelDefaultLevel for this
|
|
port having a value other than none (1).)
|
|
|
|
If this object has the value 0, then no Protection Authority
|
|
field will be added to any received packets, regardless of the
|
|
value of a3IPsecureLabelDefaultLevel."
|
|
DEFVAL { 128 }
|
|
::= { a3IPsecureParamEntry 6 }
|
|
|
|
a3IPsecureMinLevel OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
topSecret (1),
|
|
secret (2),
|
|
confidential (3),
|
|
unclassified (4)
|
|
}
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This defines the minimum classification level which
|
|
is acceptable by this port. This applies to any packet
|
|
which is entering or leaving this port. If the
|
|
classification level is outside the range defined by
|
|
the value of this object and the value of a3IPsecureMaxLevel,
|
|
the packet is discarded.
|
|
|
|
If a3IPsecureMaxLevel is set to level less than the level
|
|
indicated by this object, the value of this object will
|
|
be shifted so it is equal to a3IPsecureMaxLevel. This
|
|
will ensure that the range of security levels identified
|
|
by these two objects makes sense."
|
|
DEFVAL { unclassified }
|
|
::= { a3IPsecureParamEntry 7 }
|
|
|
|
a3IPsecureMaxLevel OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
topSecret (1),
|
|
secret (2),
|
|
confidential (3),
|
|
unclassified (4)
|
|
}
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This define the maximum classification level which
|
|
is acceptable by this port. This applies to any packet
|
|
which is entering or leaving this port. If the
|
|
classification level is outside the range defined by
|
|
the value of this object and the value of a3IPsecureMinLevel,
|
|
the packet is discarded.
|
|
|
|
If a3IPsecureMinLevel is set to a level greater than the
|
|
level identified by this object, the value of this object
|
|
will be shifted so it is equal to a3IPsecureMinLevel."
|
|
DEFVAL { unclassified }
|
|
::= { a3IPsecureParamEntry 8 }
|
|
|
|
--
|
|
-- This next table defines all combinations of Protection Authority flags which
|
|
-- are allowed to be present in any packet received by a particular port.
|
|
--
|
|
|
|
a3IPsecureAuthInTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF A3IPsecureAuthInEntry
|
|
ACCESS not-accessible
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This table enumerates all the combinations of Protection
|
|
Authority flags that may be present in packets received
|
|
over any of this system's ports."
|
|
::= { a3ComIPSO 4 }
|
|
|
|
a3IPsecureAuthInEntry OBJECT-TYPE
|
|
SYNTAX A3IPsecureAuthInEntry
|
|
ACCESS not-accessible
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"Each entry in this table contains a specific combination
|
|
of Protection Authority flags that are acceptable in packets
|
|
received over a specific port."
|
|
INDEX { a3IPsecureAuthInPort,
|
|
a3IPsecureAuthInFlags }
|
|
::= { a3IPsecureAuthInTable 1 }
|
|
|
|
A3IPsecureAuthInEntry ::= SEQUENCE {
|
|
a3IPsecureAuthInPort INTEGER,
|
|
a3IPsecureAuthInFlags INTEGER,
|
|
a3IPsecureAuthInMatch INTEGER,
|
|
a3IPsecureAuthInStatus RowStatus
|
|
}
|
|
|
|
a3IPsecureAuthInPort OBJECT-TYPE
|
|
SYNTAX INTEGER
|
|
ACCESS read-only
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This identifies the port to which this entry applies."
|
|
::= { a3IPsecureAuthInEntry 1 }
|
|
|
|
a3IPsecureAuthInFlags OBJECT-TYPE
|
|
SYNTAX INTEGER
|
|
ACCESS read-only
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This identifies one combination of Protection Authority
|
|
flags that is allowed to be present in any packet
|
|
received by this port.
|
|
|
|
The combination of Protection Authority flags that is
|
|
allowed is determined by the individual bits that are set
|
|
in the value of this object, with the two least significant
|
|
bytes being of interest. Starting from bit 7 of the
|
|
INTEGER (with the least significant bit being numbered 0),
|
|
the mapping of bits to Protection Authority flags is as
|
|
follows (note: rfc1108 labels the most significant bit '0',
|
|
the next most significant bit '1', etc),
|
|
|
|
bit# Prot. Auth. Flag
|
|
7 GENSER
|
|
6 SIOP
|
|
5 SCI
|
|
4 NSA
|
|
3 DOE
|
|
|
|
While only bits 7 through 3 have specific Protection Authority
|
|
flags assigned to them, any 2 byte combination of bits may be
|
|
set as long as that combination is allowed by rfc1108. The
|
|
same 1 or 2 byte pattern of bits identified by the value of this
|
|
object must be present in any received IP packet.
|
|
|
|
If the value of this object is zero, packets with no
|
|
Protection Authority flags are accepted by this port."
|
|
::= { a3IPsecureAuthInEntry 2 }
|
|
|
|
a3IPsecureAuthInMatch OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
exact (1),
|
|
any (2)
|
|
}
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"The value of this object determines whether the
|
|
Protection Authority flags in a received packet
|
|
must match the flags identified by the corresponding
|
|
instance of a3IPsecureAuthInFlags exactly, or if they
|
|
only have to match a subset of those flags.
|
|
|
|
If the value of this object is exact (1), the match must
|
|
be exact. If this object has the value any (2), only
|
|
a subset of the flags has to match."
|
|
DEFVAL { any }
|
|
::= { a3IPsecureAuthInEntry 3 }
|
|
|
|
a3IPsecureAuthInStatus OBJECT-TYPE
|
|
SYNTAX RowStatus
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This object is used to add and delete entries
|
|
in this table. See the notes describing
|
|
RowStatus at the beginning of this MIB."
|
|
::= { a3IPsecureAuthInEntry 4 }
|
|
|
|
--
|
|
-- This next table defines all combinations of Protection Authority flags which
|
|
-- are allowed to be present in any packet sent by a particular port.
|
|
--
|
|
|
|
a3IPsecureAuthOutTable OBJECT-TYPE
|
|
SYNTAX SEQUENCE OF A3IPsecureAuthOutEntry
|
|
ACCESS not-accessible
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This table enumerates all the combinations of Protection
|
|
Authority flags that are allowed to be present in packets
|
|
transmitted over any of this system's ports. This does not
|
|
apply to packets generated by this system."
|
|
::= { a3ComIPSO 5 }
|
|
|
|
a3IPsecureAuthOutEntry OBJECT-TYPE
|
|
SYNTAX A3IPsecureAuthOutEntry
|
|
ACCESS not-accessible
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"Each entry in this table contains a specific combination
|
|
of Protection Authority flags that are acceptable in packets
|
|
transmitted over a specific port."
|
|
INDEX { a3IPsecureAuthOutPort,
|
|
a3IPsecureAuthOutFlags }
|
|
::= { a3IPsecureAuthOutTable 1 }
|
|
|
|
A3IPsecureAuthOutEntry ::= SEQUENCE {
|
|
a3IPsecureAuthOutPort INTEGER,
|
|
a3IPsecureAuthOutFlags INTEGER,
|
|
a3IPsecureAuthOutMatch INTEGER,
|
|
a3IPsecureAuthOutStatus RowStatus
|
|
}
|
|
|
|
a3IPsecureAuthOutPort OBJECT-TYPE
|
|
SYNTAX INTEGER
|
|
ACCESS read-only
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This identifies the port to which this entry applies."
|
|
::= { a3IPsecureAuthOutEntry 1 }
|
|
|
|
a3IPsecureAuthOutFlags OBJECT-TYPE
|
|
SYNTAX INTEGER
|
|
ACCESS read-only
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This identifies one combination of Protection Authority
|
|
flags that is allowed to be present in any packet
|
|
transmitted by this port.
|
|
|
|
The combination of Protection Authority flags that is
|
|
allowed is determined by the individual bits that are set
|
|
in the value of this object, with the two least significant
|
|
bytes being of interest. Starting from bit 7 of the
|
|
INTEGER (with the least significant bit being numbered 0),
|
|
the mapping of bits to Protection Authority flags is as
|
|
follows (note: rfc1108 labels the most significant bit '0',
|
|
the next most significant bit '1', etc),
|
|
|
|
bit# Prot. Auth. Flag
|
|
7 GENSER
|
|
6 SIOP
|
|
5 SCI
|
|
4 NSA
|
|
3 DOE
|
|
|
|
While only bits 7 through 3 have specific Protection Authority
|
|
flags assigned to them, any 2 byte combination of bits may be
|
|
set as long as that combination is allowed by rfc1108. The
|
|
same 1 or 2 byte pattern of bits identified by the value of this
|
|
object is allowed to be present in any transmitted IP packet.
|
|
|
|
If the value of this object is zero, packets with no
|
|
Protection Authority flags are allowed to be transmitted
|
|
by this port."
|
|
::= { a3IPsecureAuthOutEntry 2 }
|
|
|
|
a3IPsecureAuthOutMatch OBJECT-TYPE
|
|
SYNTAX INTEGER {
|
|
exact (1),
|
|
any (2)
|
|
}
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"The value of this object determines whether the
|
|
Protection Authority flags in a received packet
|
|
must match the flags identified by the corresponding
|
|
instance of a3IPsecureAuthOutFlags exactly, or if they
|
|
only have to match a subset of those flags.
|
|
|
|
If the value of this object is exact (1), the match must
|
|
be exact. If this object has the value any (2), only
|
|
a subset of the flags have to match."
|
|
DEFVAL { any }
|
|
::= { a3IPsecureAuthOutEntry 3 }
|
|
|
|
a3IPsecureAuthOutStatus OBJECT-TYPE
|
|
SYNTAX RowStatus
|
|
ACCESS read-write
|
|
STATUS mandatory
|
|
DESCRIPTION
|
|
"This object is used to add and delete entries
|
|
in this table. See the notes describing
|
|
RowStatus at the beginning of this MIB."
|
|
::= { a3IPsecureAuthOutEntry 4 }
|
|
|
|
END
|
|
|