Dell-SSH-MIB
File:
Dell-SSH-MIB.mib (43729 bytes)
Imported modules
Imported symbols
Defined Types
RlSshPublicKeyAlgorithm |
|
This textual convention describes the various possible public key
algorithms. The key algorithm is used to select the PK to be generated
and is also used when viewing the public keys. |
TEXTUAL-CONVENTION |
|
|
|
|
INTEGER |
rsa1(0), rsa(1), dsa(2), none(999) |
|
RlSshServerHostPublicKeyTableEntry |
|
SEQUENCE |
|
|
|
|
rlSshServerHostPublicKeyAlgorithm |
RlSshPublicKeyAlgorithm |
|
|
rlSshServerHostPublicKeyFragmentId |
Unsigned32 |
|
|
rlSshServerHostPublicKeyFragmentText |
DisplayString |
|
RlSshServerHostPublicKeyFingerprintTableEntry |
|
SEQUENCE |
|
|
|
|
rlSshServerHostPublicKeyFingerprintAlgorithm |
RlSshPublicKeyAlgorithm |
|
|
rlSshServerHostPublicKeyFingerprintDigestFormat |
RlSshPublicKeyDigestFormat |
|
|
rlSshServerHostPublicKeyFingerprint |
DisplayString |
|
RlSshServerAuthorizedUsersPublicKeyTableEntry |
|
SEQUENCE |
|
|
|
|
rlSshServerAuthorizedUserName |
DisplayString |
|
|
rlSshServerAuthorizedUserPublicKeyFragmentId |
Unsigned32 |
|
|
rlSshServerAuthorizedUserPublicKeyFragmentText |
DisplayString |
|
|
rlSshServerAuthorizedUserPublicKeyFragmentStatus |
RowStatus |
|
RlSshServerAuthorizedUsersPublicKeyFingerprintTableEntry |
|
SEQUENCE |
|
|
|
|
rlSshServerAuthorizedUserFingerprintName |
DisplayString |
|
|
rlSshServerAuthorizedUserPublicKeyFingerprintDigestFormat |
RlSshPublicKeyDigestFormat |
|
|
rlSshServerAuthorizedUserPublicKeyFingerprintAlgorithm |
RlSshPublicKeyAlgorithm |
|
|
rlSshServerAuthorizedUserPublicKeyFingerprint |
DisplayString |
|
RlSshServerSessionTableEntry |
|
SEQUENCE |
|
|
|
|
rlSshServerSessionIdentifier |
Unsigned32 |
|
|
rlSshServerSessionPeerAddress |
IpAddress |
|
|
rlSshServerSessionPeerPort |
Unsigned32 |
|
|
rlSshServerSessionUsername |
DisplayString |
|
|
rlSshServerSessionPeerVersion |
DisplayString |
|
|
rlSshServerSessionCipher |
DisplayString |
|
|
rlSshServerSessionHMAC |
DisplayString |
|
RlSshServerSessionInetTableEntry |
|
SEQUENCE |
|
|
|
|
rlSshServerSessionInetIdentifier |
Unsigned32 |
|
|
rlSshServerSessionInetPeerAddressType |
InetAddressType |
|
|
rlSshServerSessionInetPeerAddress |
InetAddress |
|
|
rlSshServerSessionInetPeerPort |
Unsigned32 |
|
|
rlSshServerSessionInetUsername |
DisplayString |
|
|
rlSshServerSessionInetPeerVersion |
DisplayString |
|
|
rlSshServerSessionInetCipher |
DisplayString |
|
|
rlSshServerSessionInetHMAC |
DisplayString |
|
RlSshServerImportExportSelfKeyEntry |
|
SEQUENCE |
|
|
|
|
rlSshServerImportExportSelfKeyAlgorithm |
RlSshPublicKeyAlgorithm |
|
|
rlSshServerImportExportSelfKeyFormat |
INTEGER |
|
|
rlSshServerImportExportSelfKeyFragmentId |
INTEGER |
|
|
rlSshServerImportExportSelfKeyFragmentText |
OCTET STRING |
|
RlSshClientSelfPublicKeyTableEntry |
|
SEQUENCE |
|
|
|
|
rlSshClientSelfPublicKeyFragmentId |
Unsigned32 |
|
|
rlSshClientSelfPublicKeyAlgorithm |
RlSshPublicKeyAlgorithm |
|
|
rlSshClientSelfPublicKeyFragmentText |
DisplayString |
|
RlSshClientSelfPublicKeyFingerprintTableEntry |
|
SEQUENCE |
|
|
|
|
rlSshClientSelfPublicKeyFingerprintAlgorithm |
RlSshPublicKeyAlgorithm |
|
|
rlSshClientSelfPublicKeyFingerprintDigestFormat |
RlSshPublicKeyDigestFormat |
|
|
rlSshClientSelfPublicKeyFingerprint |
DisplayString |
|
RlSshClientPasswordChangeEntry |
|
SEQUENCE |
|
|
|
|
rlSshClientPasswordChangeInetAddrType |
InetAddressType |
|
|
rlSshClientPasswordChangeInetAddr |
InetAddress |
|
|
rlSshClientPasswordChangeUsername |
DisplayString |
|
|
rlSshClientPasswordChangeOldPassword |
DisplayString |
|
|
rlSshClientPasswordChangeNewPassword |
DisplayString |
|
|
rlSshClientPasswordChangeStatus |
INTEGER |
|
|
rlSshClientPasswordChangeFailureReason |
DisplayString |
|
RlSshClientImportExportSelfKeyEntry |
|
SEQUENCE |
|
|
|
|
rlSshClientImportExportSelfKeyAlgorithm |
RlSshPublicKeyAlgorithm |
|
|
rlSshClientImportExportSelfKeyFormat |
INTEGER |
|
|
rlSshClientImportExportSelfKeyFragmentId |
INTEGER |
|
|
rlSshClientImportExportSelfKeyFragmentText |
OCTET STRING |
|
RlSshClientRemoteServerPublicKeyFingerprintEntry |
|
SEQUENCE |
|
|
|
|
rlSshClientRemoteServerFingerprintInetAddrType |
InetAddressType |
|
|
rlSshClientRemoteServerFingerprintInetAddr |
InetAddress |
|
|
rlSshClientRemoteServerFingerprint |
OCTET STRING |
|
|
rlSshClientRemoteServerFingerprintStatus |
RowStatus |
|
Defined Values
rlSsh |
1.3.6.1.4.1.89.78 |
The MIB module describes the private MIB for SSH supported
by Dell's software and products. |
MODULE-IDENTITY |
|
|
|
rlSshMibVersion |
1.3.6.1.4.1.89.78.1 |
The MIB version. The current version is 2 |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
|
|
rlSshServerHostPublicKeyTable |
1.3.6.1.4.1.89.78.2.1 |
This table contains the router's public key. Each row in this table
contains a fragment of the key, in printable binhex format. There may
be up to 160 characters in every fragment, and they are all combined
to form one key. The key is generated by writing to
rlSshServerRegenerateHostKey. To cause clients to connect to this router
without printing warning messages (and also prevent active
man-in-the-middle), the router's public key must printed out and inserted
into the client's authorized_keys file |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
RlSshServerHostPublicKeyTableEntry |
|
rlSshServerHostPublicKeyTableEntry |
1.3.6.1.4.1.89.78.2.1.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshServerHostPublicKeyTableEntry |
|
|
rlSshServerHostPublicKeyFragmentId |
1.3.6.1.4.1.89.78.2.1.1.2 |
Identifies the index of this fragment in the final key. All segments must
be combined to form one big key. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
|
|
rlSshServerHostPublicKeyFragmentText |
1.3.6.1.4.1.89.78.2.1.1.3 |
A part of the readable text entry for the server's public authorzation key. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
DisplayString |
|
|
rlSshServerHostPublicKeyFingerprintTableEntry |
1.3.6.1.4.1.89.78.2.2.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshServerHostPublicKeyFingerprintTableEntry |
|
|
rlSshServerHostPublicKeyFingerprint |
1.3.6.1.4.1.89.78.2.2.1.3 |
SECSH format fingerprint of the server's public key. To prevent man in
the middle attacks, users should make sure the ssh Server's fingerprint,
as printed in the connection process, is similar to the one printed here. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
DisplayString |
|
|
rlSshServerAuthorizedUsersPublicKeyTableEntry |
1.3.6.1.4.1.89.78.2.3.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshServerAuthorizedUsersPublicKeyTableEntry |
|
|
rlSshServerAuthorizedUserName |
1.3.6.1.4.1.89.78.2.3.1.1 |
Name of the user who owns this public key. Both the user name and the
key bytes must match before a user is authenticated using this key. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(1..48) |
|
rlSshServerAuthorizedUserPublicKeyFragmentText |
1.3.6.1.4.1.89.78.2.3.1.3 |
A part of the readable text entry for the user's public authorzation key. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
|
|
rlSshServerAuthorizedUserFingerprintName |
1.3.6.1.4.1.89.78.2.5.1.1 |
Name of the user who owns this public key. Both the user name and the
key bytes must match before a user is authenticated using this key. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(1..48) |
|
rlSshServerAuthorizedUserPublicKeyFingerprint |
1.3.6.1.4.1.89.78.2.5.1.4 |
SECSH format fingerprint of the user's public key. To prevent man in
the middle attacks, users should make sure their ssh fingerprint,
as printed in the connection process, is similar to the one printed here. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
DisplayString |
|
|
rlSshServerSessionTableEntry |
1.3.6.1.4.1.89.78.2.6.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshServerSessionTableEntry |
|
|
rlSshServerSessionInetTableEntry |
1.3.6.1.4.1.89.78.2.7.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshServerSessionInetTableEntry |
|
|
rlSshServerImportExportSelfKeyTable |
1.3.6.1.4.1.89.78.2.8 |
This table can be used for 2 purposes:
1) Importing public/private key pair to serve as the device key when acting
as SSH server. This is done by setting entries to this table, according to
the specified format. When the last entry (footer) is set, the whole key
pair is checked and if valid, stored in CDB.
2) Exporting the device SSH server public/private key. This can be done by
performing GetNext operations on this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
RlSshServerImportExportSelfKeyEntry |
|
rlSshServerImportExportSelfKeyEntry |
1.3.6.1.4.1.89.78.2.8.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshServerImportExportSelfKeyEntry |
|
|
rlSshServerImportExportSelfKeyFragmentText |
1.3.6.1.4.1.89.78.2.8.1.4 |
A part of the readable text entry for the key pair input/output. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
OCTET STRING |
|
|
rlSshServerPort |
1.3.6.1.4.1.89.78.2.101 |
Specifies the TCP port used by the SSH 2 Server to listen for incoming
connections. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
1..65535 |
|
rlSshServerEnable |
1.3.6.1.4.1.89.78.2.102 |
Enables listening for incoming SSH2 connections on the port defined in
rlSshServerPort. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enable(1), disable(2) |
|
rlSshServerEnablePublicKeyAuthentication |
1.3.6.1.4.1.89.78.2.103 |
If PK authentication is enabled, incoming SSH connections are
authenticated using public key authentication (using
rlSshServerAuthorizedUsersPublicKeyTable), before authenticating using
the router's standard AAA. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enable(1), disable(2) |
|
rlSshServerDefaultKeyFlag |
1.3.6.1.4.1.89.78.2.105 |
This scalar indicates which of the SSH server keys are default keys
(automatically generated). |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
rsa(1), dsa(2), all(3), none(4) |
|
rlSshServerDeleteSelfKey |
1.3.6.1.4.1.89.78.2.106 |
Setting to a value other than 'none' results in deleting the server self
key of the chosen type. As a result a default key may be created
(according to the MTSC..) |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
RlSshPublicKeyAlgorithm |
|
|
rlSshServerEnablePublicKeyAuthAutoLogin |
1.3.6.1.4.1.89.78.2.107 |
If PK authentication is succesfull and AAA local DB method
is enabled for SSH line, the username is checked with AAA
local DB. If present, the user is authenticated automatically
without prompting for username or password. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enable(1), disable(2) |
|
rlSshServerEnablePasswordAuthentication |
1.3.6.1.4.1.89.78.2.108 |
If password authentication is enabled, incoming SSH connections are
authenticated with username/password authentication using
the router's standard AAA. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enable(1), disable(2) |
|
rlSshClientUserName |
1.3.6.1.4.1.89.78.3.1 |
Specifies the default user name the ssh client will use when
authenticating to a remote server. In SCP sessions this global
user name will be used unless a specific user name has been specified
for the operation.
The value of this MIB must not contain charachters ':' or '@' (those
are used to indicate parameters seperation in SCP copy). |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(1..70) |
|
rlSshClientSelfPublicKeyTable |
1.3.6.1.4.1.89.78.3.3 |
This table contains the router's client self public key. Each row in
this table contains a fragment of the key, in printable binhex format.
There may be up to 160 characters in every fragment, and they are all
combined to form one key. The key is generated by writing to
rlSshClientRegenerateSelfKey. To cause clients to connect to this router
without printing warning messages (and also prevent active
man-in-the-middle), the router's public key must printed out and
inserted into the client's authorized_keys file |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
RlSshClientSelfPublicKeyTableEntry |
|
rlSshClientSelfPublicKeyTableEntry |
1.3.6.1.4.1.89.78.3.3.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshClientSelfPublicKeyTableEntry |
|
|
rlSshClientSelfPublicKeyFragmentId |
1.3.6.1.4.1.89.78.3.3.1.1 |
Identifies the index of this fragment in the final key. All segments must
be combined to form one big key. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
Unsigned32 |
|
|
rlSshClientSelfPublicKeyFragmentText |
1.3.6.1.4.1.89.78.3.3.1.3 |
A part of the readable text entry for the router's client public
authorization key. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
|
|
rlSshClientSelfPublicKeyFingerprintTableEntry |
1.3.6.1.4.1.89.78.3.4.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshClientSelfPublicKeyFingerprintTableEntry |
|
|
rlSshClientSelfPublicKeyFingerprint |
1.3.6.1.4.1.89.78.3.4.1.3 |
SECSH format fingerprint of the client's self key. To prevent man in
the middle attacks, users should make sure the ssh Server's fingerprint,
as printed in the connection process, is similar to the one printed here. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
DisplayString |
|
|
rlSshClientAuthenticationMethod |
1.3.6.1.4.1.89.78.3.5 |
Specifies the global authentication method for SSH client. SSH client
will apply this authentication method upon connecting to a remote server,
if no specific authentication method has been defined for this operation. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
public-key-rsa(1), public-key-dsa(2), password(3) |
|
rlSshClientPassword |
1.3.6.1.4.1.89.78.3.6 |
Specifies the global password for SSH client, to be used for 'password'
authentication. SSH client will use this password during authentication
phase (when connecting remote server), in case no specific password has
been specified for this operation.
The value of this MIB must not contain charachters ':' or '@' (those
are used to indicate parameters seperation in SCP copy).
Upon setting the password, its length must be in range 1-70. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(0..70) |
|
rlSshClientPasswordChangeTable |
1.3.6.1.4.1.89.78.3.7 |
This table allows the user to change the password in a remote SSH server.
It should be used when working with 'password' authentication with remote
server in SCP sessions.
Set operation on this table will initiate SCP session with the SSH server
whose inet address is specified in the key rlSshClientPasswordChangeInetAddress.
During this session the password for username rlSshClientPasswordChangeUsername
will be changed in the server from rlSshClientPasswordChangeOldPassword to
rlSshClientPasswordChangeNewPassword.
The Set operation might fail, in case an SCP session is already being
held. In case 'noError' is returned, the user can poll the fields
rlSshClientPasswordChangeStatus and rlSshClientPasswordChangeFailureReason
in order to get information on operation status and possible failure
reason. Note: up to 3 status records can be saved. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
RlSshClientPasswordChangeEntry |
|
rlSshClientPasswordChangeEntry |
1.3.6.1.4.1.89.78.3.7.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshClientPasswordChangeEntry |
|
|
rlSshClientPasswordChangeOldPassword |
1.3.6.1.4.1.89.78.3.7.1.4 |
Specifies the old password that was in use for rlSshClientPasswordChangeUsername
until now. Upon setting a value in this entry, length of this field value
must be 6-70. Password of length 0 will always be returned on GET operations. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(0..70) |
|
rlSshClientPasswordChangeNewPassword |
1.3.6.1.4.1.89.78.3.7.1.5 |
Specifies the new password that should be in use for
rlSshClientPasswordChangeUsername from now on. Upon setting a value in this
entry, length of this field value must be 6-70.
Password of length 0 will always be returned on GET operations. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
DisplayString |
Size(0..70) |
|
rlSshClientPasswordChangeStatus |
1.3.6.1.4.1.89.78.3.7.1.6 |
Specifies the status of last password change operation on remote server
identified by rlSshClientPasswordChangeInetAddress. In case this data was
erased (3 or more password change operations have been performed since
the operation on this server), the status will be 'noData'. |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
inProgress(1), succeeded(2), failed(3), noData(4) |
|
rlSshClientImportExportSelfKeyTable |
1.3.6.1.4.1.89.78.3.9 |
This table can be used for 2 purposes:
1) Importing public/private key pair to serve as the device key when acting
as SSH client. This is done by setting entries to this table, according to
the specified format. When the last entry (footer) is set, the whole key
pair is checked and if valid, stored in CDB.
2) Exporting the device SSH client public/private key. This can be done by
performing GetNext operations on this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
SEQUENCE OF |
|
|
|
|
RlSshClientImportExportSelfKeyEntry |
|
rlSshClientImportExportSelfKeyEntry |
1.3.6.1.4.1.89.78.3.9.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshClientImportExportSelfKeyEntry |
|
|
rlSshClientImportExportSelfKeyFragmentText |
1.3.6.1.4.1.89.78.3.9.1.4 |
A part of the readable text entry for the key pair input/output. |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
OCTET STRING |
|
|
rlSshClientRemoteServerPublicKeyFingerprintEntry |
1.3.6.1.4.1.89.78.3.10.1 |
The row definition for this table. |
Status: current |
Access: not-accessible |
OBJECT-TYPE |
|
|
|
|
RlSshClientRemoteServerPublicKeyFingerprintEntry |
|
|
rlSshClientRemoteServersAuthenticationEnable |
1.3.6.1.4.1.89.78.3.11 |
Setting this field to 'enable' enables remote servers authentication.
As a result, while opening a session with a remote server, the fingerprint
of the remote server will be computed and looked for in the table
rlSshClientRemoteServerPublicKeyFingerprintTable. If an entry with the key
(server-inet-address, server-fingerprint) is found, the server is considered
authenticated. Otherwise, the server is not authenticated (unless the user
specifically approved this server can be trusted). |
Status: current |
Access: read-write |
OBJECT-TYPE |
|
|
|
|
INTEGER |
enable(1), disable(2) |
|
rlSshClientDefaultKeyFlag |
1.3.6.1.4.1.89.78.3.12 |
This scalar indicates which of the SSH client keys are default keys
(automatically generated). |
Status: current |
Access: read-only |
OBJECT-TYPE |
|
|
|
|
INTEGER |
rsa(1), dsa(2), all(3), none(4) |
|