Dell-SECSD-MIB
File:
Dell-SECSD-MIB.mib (15755 bytes)
Imported modules
Imported symbols
Defined Types
RlSecSdRuleUserType |
|
The Security Sensitive Data channels access users.
user-name - the rule is per rlSecSdRuleUserName.
default-user - the rule is per the default system user name.
all-users - all users which their user level permission is less then 15.
level-15-users - users which their user level permission is 15. |
TEXTUAL-CONVENTION |
|
|
|
|
INTEGER |
user-name(1), default-user(2), level-15-users(3), all-users(4) |
|
RlSecSdChannelType |
|
The Security Sensitive Data channels:
secure - secure channels as console, ssh, scp, https.
insecure - insecure channels as telnet, http.
secure-xml-snmp - SNMPv3 with privacy or XML over https.
insecure-xml-snmp - SNMPv1/v2/v3 without privacy, xml over http. |
TEXTUAL-CONVENTION |
|
|
|
|
INTEGER |
secure-xml-snmp(1), secure(2), insecure(3), insecure-xml-snmp(4) |
|
RlSecSdAccessType |
|
The Security Sensitive Data channels default read/write access action:
exclude - Security Sensitive Data can not retrieved/set.
include-encrypted - SSD can retrieved/set as encrypted only.
include-decrypted - SSD can retrieved/set as decrypted only. |
TEXTUAL-CONVENTION |
|
|
|
|
INTEGER |
exclude(1), include-encrypted(2), include-decrypted(3) |
|
RlSecSdPermitAccessType |
|
The Security Sensitive Data channels access permit read/write action:
exclude - Security Sensitive Data can not retrieved/set.
include-encrypted - SSD can retrieved/set as encrypted only.
include-decrypted - SSD can retrieved/set as decrypted only.
include-all - SSD can retrieved/set as encrypted or as decrypted. |
TEXTUAL-CONVENTION |
|
|
|
|
INTEGER |
exclude(1), include-encrypted(2), include-decrypted(3), include-all(4) |
|
RlSecSdSessionAccessType |
|
The Security Sensitive Data (SSD) channels access per session:
exclude - Security Sensitive Data can not retrieved.
include-encrypted - SSD can retrieved as encrypted only.
include-decrypted - SSD can retrieved as decrypted only.
default - Set to the default SSD access as defined by the SSD rules. |
TEXTUAL-CONVENTION |
|
|
|
|
INTEGER |
exclude(1), include-encrypted(2), include-decrypted(3), default(4) |
|
RlSecSdRuleOwnerType |
|
The Security Sensitive Data rule owner:
default - default rule which is defined by the device.
user - rule which is defined by user. |
TEXTUAL-CONVENTION |
|
|
|
|
INTEGER |
default(1), user(2) |
|
RlSecSdRulesEntry |
|
SEQUENCE |
|
|
|
|
rlSecSdRuleUser |
RlSecSdRuleUserType |
|
|
rlSecSdRuleUserName |
DisplayString |
|
|
rlSecSdRuleChannel |
RlSecSdChannelType |
|
|
rlSecSdRuleRead |
RlSecSdAccessType |
|
|
rlSecSdRulePermitRead |
RlSecSdPermitAccessType |
|
|
rlSecSdRuleIsDefault |
TruthValue |
|
|
rlSecSdRuleOwner |
RlSecSdRuleOwnerType |
|
|
rlSecSdRuleStatus |
RowStatus |
|
RlSecSdMngSessionsEntry |
|
SEQUENCE |
|
|
|
|
rlSecSdMngSessionId |
INTEGER |
|
|
rlSecSdMngSessionUserLevel |
INTEGER |
|
|
rlSecSdMngSessionUserName |
DisplayString |
|
|
rlSecSdMngSessionChannel |
RlSecSdChannelType |
|
Defined Values
rlSecSd |
1.3.6.1.4.1.89.209 |
The private MIB module definition for Security Sensitive Data (SSD),
contains the MIB tables and scalars to manage the access through
the different management channels as CLI, WEB and others,
for sensitive data as user names and passwords in system. |
MODULE-IDENTITY |
|
|
|
rlSecSdRulesTable |
1.3.6.1.4.1.89.209.1 |
The table holding the Security Sensitive Data access rules per:
user name / user level and management channel.
Allow to add/edit/remove Security Sensitive Data rules. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
RlSecSdRulesEntry |
|
rlSecSdRulesEntry |
1.3.6.1.4.1.89.209.1.1 |
An entry in the rlSecSdRulesTable. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSecSdRulesEntry |
|
|
rlSecSdRuleUser |
1.3.6.1.4.1.89.209.1.1.1 |
Contains the Rule user type as described in RlSecSdRuleUserType. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
RlSecSdRuleUserType |
|
|
rlSecSdRuleUserName |
1.3.6.1.4.1.89.209.1.1.2 |
Contains the Rule user name when rlSecSdRuleUser value is user-name,
Otherwise it contains an empty string |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(0..39) |
|
rlSecSdRuleChannel |
1.3.6.1.4.1.89.209.1.1.3 |
Contains the Rule management channel type as described in RlSecSdChannelType.
secure-xml-snmp and insecure-xml-snmp management channels have no include-encrypted capability
thus their rlSecSdRulePermitRead and rlSecSdRuleRead can have only RlSecSdAccessType values of
exclude or include-decrypted. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
RlSecSdChannelType |
|
|
rlSecSdRuleRead |
1.3.6.1.4.1.89.209.1.1.4 |
Contains the Rule default read access level as described in RlSecSdAccessType,
must be lower or equal access from rlSecSdRulePermitRead |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
RlSecSdAccessType |
|
|
rlSecSdRuleIsDefault |
1.3.6.1.4.1.89.209.1.1.6 |
true - Rule has created by the by the system.
false - Rule has created by the user. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
TruthValue |
|
|
rlSecSdRuleOwner |
1.3.6.1.4.1.89.209.1.1.7 |
Contains the current Rule ownership as defined in RlSecSdRuleOwnerType.
when rlSecSdRuleIsDefault is true, rlSecSdRuleOwner allowed to change
default rule to user rule and vice versa. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
RlSecSdRuleOwnerType |
|
|
rlSecSdRuleStatus |
1.3.6.1.4.1.89.209.1.1.8 |
The status of a table entry.
It is used to Add/Edit/Delete an entry from this table. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
RowStatus |
|
|
rlSecSdMngSessionsTable |
1.3.6.1.4.1.89.209.2 |
The table holding Security Sensitive Data management sessions.
Allowing to get management channel, user name, user level. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
RlSecSdMngSessionsEntry |
|
rlSecSdMngSessionsEntry |
1.3.6.1.4.1.89.209.2.2 |
An entry in the rlSecSdMngSessionsTable. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSecSdMngSessionsEntry |
|
|
rlSecSdMngSessionId |
1.3.6.1.4.1.89.209.2.2.1 |
Contains the Security Sensitive Data management session identifier,
rlSecSdCurrentSessionId is used to get the current management session identifier |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
|
|
rlSecSdMngSessionUserLevel |
1.3.6.1.4.1.89.209.2.2.2 |
Contains the Security Sensitive Data management session user access level. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
|
|
rlSecSdMngSessionUserName |
1.3.6.1.4.1.89.209.2.2.3 |
Contains the Security Sensitive Data management session user name. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(0..160) |
|
rlSecSdMngSessionChannel |
1.3.6.1.4.1.89.209.2.2.4 |
Contains the Security Sensitive Data management session channel type as described in RlSecSdChannelType. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
RlSecSdChannelType |
|
|
rlSecSdSessionControl |
1.3.6.1.4.1.89.209.3 |
Action scalar which set the default read access of Security Sensitive Data.
Affect only on session which from this scalar is configured.
Scalar Get value is the default-display/read of the session which from
this scalar is retrieved. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
RlSecSdSessionAccessType |
|
|
rlSecSdCurrentSessionId |
1.3.6.1.4.1.89.209.4 |
Get the current SSD management channel identifier,
used to get information from rlSecSdMngSessionsTable. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
|
|
rlSecSdPassPhrase |
1.3.6.1.4.1.89.209.5 |
Set the passphrase for the SSD encryptyption / decryption key.
on set, passphrase is in plain text format.
on get, passphrase is encrypted. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(0..160) |
|
rlSecSdFilePassphraseControl |
1.3.6.1.4.1.89.209.6 |
File Passphrase control provides an additional level of protection on passphrase and configurations.
restricted - a device restricts its passphrase from being inserted into a configuration file.
unrestricted - (default) a device will include its passphrase when creating a configuration file. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
restricted(1), unrestricted(2) |
|
rlSecSdFileIntegrityControl |
1.3.6.1.4.1.89.209.7 |
File integrity control provides a validation of configuration file.
enable - Validate the configuration file digest when downloading the file to startup configuration.
disable - Do not validate. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enable(1), disable(2) |
|
rlSecSdConfigurationFileSsdDigest |
1.3.6.1.4.1.89.209.8 |
SSD block in configuration file integrity digest, auxiliary action scalar for
internal system using during configuration download. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(0..160) |
|
rlSecSdConfigurationFileDigest |
1.3.6.1.4.1.89.209.9 |
SSD configuration file integrity digest, auxiliary action scalar for
internal system using during configuration download. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(0..160) |
|
rlSecSdFileIndicator |
1.3.6.1.4.1.89.209.10 |
Retrieve configuration file SSD indicator.
set value: configuration file name.
get value: Exclude, Encrypted, Plaintext |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(0..39) |
|