AD | Application | AWS | Azure | Cloud | Database | Enterprise | Environmental | Event Log | File System | IoT | IT Service | Network/System | Infra | Performance | Protocol | SaaS | Security | Service Level | Storage | Linux | VMware | VoIP | Web | Wireless | SNMP

Crumbtrail

MonitorTools.com » Technical documentation » SNMP » MIB » RFC » SNMPv2-PARTY-MIB » Objects

SNMPv2-PARTY-MIB.mib object view, vendor RFC

Introduction

Most network devices and programs ship with so-called MIB files to describe the parameters and meanings (i.e.: friendly names) which are available for monitoring via SNMP.
ActiveXperts Network Monitor 2024 can import vendor-specific MIB files, so it can be used to monitor specific OID's (Object Identifiers). This way, you can monitor your devices, computers, etc. by selecting your relevant OID's by name.

ActiveXperts Network Monitor 2024 can import MIB file SNMPv2-PARTY-MIB and use it to monitor vendor specific OID's.

SNMPv2-PARTY-MIB file content

Object view of SNMPv2-PARTY-MIB:

Scalar Object
partyEntry .1.3.6.1.6.3.3.2.1.1.1
Locally held information about a particular SNMPv2 party.
contextEntry .1.3.6.1.6.3.3.2.2.1.1
Locally held information about a particular SNMPv2 context.
aclEntry .1.3.6.1.6.3.3.2.3.1.1
The access privileges for a particular subject SNMPv2 party when asking a particular target SNMPv2 party to access a particular SNMPv2 context.
viewEntry .1.3.6.1.6.3.3.2.4.1.1
Information on a particular family of view subtrees included in or excluded from a particular SNMPv2 context's MIB view. Implementations must not restrict the number of families of view subtrees for a given MIB view, except as dictated by resource constraints on the overall number of entries in the viewTable.
Tabular Object
partyIdentity .1.3.6.1.6.3.3.2.1.1.1.1
A party identifier uniquely identifying a particular SNMPv2 party.
partyIndex .1.3.6.1.6.3.3.2.1.1.1.2
A unique value for each SNMPv2 party. The value for each SNMPv2 party must remain constant at least from one re-initialization of the entity's network management system to the next re- initialization.
partyTDomain .1.3.6.1.6.3.3.2.1.1.1.3
Indicates the kind of transport service by which the party receives network management traffic.
partyTAddress .1.3.6.1.6.3.3.2.1.1.1.4
The transport service address by which the party receives network management traffic, formatted according to the corresponding value of partyTDomain. For snmpUDPDomain, partyTAddress is formatted as a 4-octet IP Address concatenated with a 2-octet UDP port number.
partyMaxMessageSize .1.3.6.1.6.3.3.2.1.1.1.5
The maximum length in octets of a SNMPv2 message which this party will accept. For parties which execute at an agent, the agent initializes this object to the maximum length supported by the agent, and does not let the object be set to any larger value. For parties which do not execute at the agent, the agent must allow the manager to set this object to any legal value, even if it is larger than the agent can generate.
partyLocal .1.3.6.1.6.3.3.2.1.1.1.6
An indication of whether this party executes at this SNMPv2 entity. If this object has a value of true(1), then the SNMPv2 entity will listen for SNMPv2 messages on the partyTAddress associated with this party. If this object has the value false(2), then the SNMPv2 entity will not listen for SNMPv2 messages on the partyTAddress associated with this party.
partyAuthProtocol .1.3.6.1.6.3.3.2.1.1.1.7
The authentication protocol by which all messages generated by the party are authenticated as to origin and integrity. The value noAuth signifies that messages generated by the party are not authenticated. Once an instance of this object is created, its value can not be changed.
partyAuthClock .1.3.6.1.6.3.3.2.1.1.1.8
The authentication clock which represents the local notion of the current time specific to the party. This value must not be decremented unless the party's private authentication key is changed simultaneously.
partyAuthPrivate .1.3.6.1.6.3.3.2.1.1.1.9
An encoding of the party's private authentication key which may be needed to support the authentication protocol. Although the value of this variable may be altered by a management operation (e.g., a SNMPv2 Set-Request), its value can never be retrieved by a management operation: when read, the value of this variable is the zero length OCTET STRING. The private authentication key is NOT directly represented by the value of this variable, but rather it is represented according to an encoding. This encoding is the bitwise exclusive-OR of the old key with the new key, i.e., of the old private authentication key (prior to the alteration) with the new private authentication key (after the alteration). Thus, when processing a received protocol Set operation, the new private authentication key is obtained from the value of this variable as the result of a bitwise exclusive-OR of the variable's value and the old private authentication key. In calculating the exclusive-OR, if the old key is shorter than the new key, zero-valued padding is appended to the old key. If no value for the old key exists, a zero-length OCTET STRING is used in the calculation.
partyAuthPublic .1.3.6.1.6.3.3.2.1.1.1.10
A publically-readable value for the party. Depending on the party's authentication protocol, this value may be needed to support the party's authentication protocol. Alternatively, it may be used by a manager during the procedure for altering secret information about a party. (For example, by altering the value of an instance of this object in the same SNMPv2 Set-Request used to update an instance of partyAuthPrivate, a subsequent Get-Request can determine if the Set- Request was successful in the event that no response to the Set-Request is received, see [4].) The length of the value is dependent on the party's authentication protocol. If not used by the authentication protocol, it is recommended that agents support values of any length up to and including the length of the corresponding partyAuthPrivate object.
partyAuthLifetime .1.3.6.1.6.3.3.2.1.1.1.11
The lifetime (in units of seconds) which represents an administrative upper bound on acceptable delivery delay for protocol messages generated by the party. Once an instance of this object is created, its value can not be changed.
partyPrivProtocol .1.3.6.1.6.3.3.2.1.1.1.12
The privacy protocol by which all protocol messages received by the party are protected from disclosure. The value noPriv signifies that messages received by the party are not protected. Once an instance of this object is created, its value can not be changed.
partyPrivPrivate .1.3.6.1.6.3.3.2.1.1.1.13
An encoding of the party's private encryption key which may be needed to support the privacy protocol. Although the value of this variable may be altered by a management operation (e.g., a SNMPv2 Set-Request), its value can never be retrieved by a management operation: when read, the value of this variable is the zero length OCTET STRING. The private encryption key is NOT directly represented by the value of this variable, but rather it is represented according to an encoding. This encoding is the bitwise exclusive-OR of the old key with the new key, i.e., of the old private encryption key (prior to the alteration) with the new private encryption key (after the alteration). Thus, when processing a received protocol Set operation, the new private encryption key is obtained from the value of this variable as the result of a bitwise exclusive-OR of the variable's value and the old private encryption key. In calculating the exclusive-OR, if the old key is shorter than the new key, zero-valued padding is appended to the old key. If no value for the old key exists, a zero-length OCTET STRING is used in the calculation.
partyPrivPublic .1.3.6.1.6.3.3.2.1.1.1.14
A publically-readable value for the party. Depending on the party's privacy protocol, this value may be needed to support the party's privacy protocol. Alternatively, it may be used by a manager as a part of its procedure for altering secret information about a party. (For example, by altering the value of an instance of this object in the same SNMPv2 Set-Request used to update an instance of partyPrivPrivate, a subsequent Get-Request can determine if the Set- Request was successful in the event that no response to the Set-Request is received, see [4].) The length of the value is dependent on the party's privacy protocol. If not used by the privacy protocol, it is recommended that agents support values of any length up to and including the length of the corresponding partyPrivPrivate object.
partyCloneFrom .1.3.6.1.6.3.3.2.1.1.1.15
The identity of a party to clone authentication and privacy parameters from. When read, the value { 0 0 } is returned. This value must be written exactly once, when the associated instance of partyStatus either does not exist or has the value `notReady'. When written, the value identifies a party, the cloning party, whose status column has the value `active'. The cloning party is used in two ways. One, if instances of the following objects do not exist for the party being created, then they are created with values identical to those of the corresponding objects for the cloning party: partyAuthProtocol partyAuthPublic partyAuthLifetime partyPrivProtocol partyPrivPublic Two, instances of the following objects are updated using the corresponding values of the cloning party: partyAuthPrivate partyPrivPrivate (e.g., the value of the cloning party's instance of the partyAuthPrivate object is XOR'd with the value of the partyAuthPrivate instances of the party being created.)
partyStorageType .1.3.6.1.6.3.3.2.1.1.1.16
The storage type for this conceptual row in the partyTable.
partyStatus .1.3.6.1.6.3.3.2.1.1.1.17
The status of this conceptual row in the partyTable. A party is not qualified for activation until instances of all columns of its partyEntry row have an appropriate value. In particular: A value must be written to the Party's partyCloneFrom object. If the Party's partyAuthProtocol object has the value md5AuthProtocol, then the corresponding instance of partyAuthPrivate must contain a secret of the appropriate length. Further, at least one management protocol set operation updating the value of the party's partyAuthPrivate object must be successfully processed, before the partyAuthPrivate column is considered appropriately configured. If the Party's partyPrivProtocol object has the value desPrivProtocol, then the corresponding instance of partyPrivPrivate must contain a secret of the appropriate length. Further, at least one management protocol set operation updating the value of the party's partyPrivPrivate object must be successfully processed, before the partyPrivPrivate column is considered appropriately configured. Until instances of all corresponding columns are appropriately configured, the value of the corresponding instance of the partyStatus column is `notReady'.
contextIdentity .1.3.6.1.6.3.3.2.2.1.1.1
A context identifier uniquely identifying a particular SNMPv2 context.
contextIndex .1.3.6.1.6.3.3.2.2.1.1.2
A unique value for each SNMPv2 context. The value for each SNMPv2 context must remain constant at least from one re-initialization of the entity's network management system to the next re-initialization.
contextLocal .1.3.6.1.6.3.3.2.2.1.1.3
An indication of whether this context is realized by this SNMPv2 entity.
contextViewIndex .1.3.6.1.6.3.3.2.2.1.1.4
If the value of an instance of this object is zero, then this corresponding conceptual row in the contextTable refers to a SNMPv2 context which identifies a proxy relationship; the values of the corresponding instances of the contextProxyDstParty, contextProxySrcParty, and contextProxyContext objects provide further information on the proxy relationship. Otherwise, if the value of an instance of this object is greater than zero, then this corresponding conceptual row in the contextTable refers to a SNMPv2 context which identifies a MIB view of a locally accessible entity; the value of the instance identifies the particular MIB view which has the same value of viewIndex; and the value of the corresponding instances of the contextLocalEntity and contextLocalTime objects provide further information on the local entity and its temporal domain.
contextLocalEntity .1.3.6.1.6.3.3.2.2.1.1.5
If the value of the corresponding instance of the contextViewIndex is greater than zero, then the value of an instance of this object identifies the local entity whose management information is in the SNMPv2 context's MIB view. The empty string indicates that the MIB view contains the SNMPv2 entity's own local management information; otherwise, a non-empty string indicates that the MIB view contains management information of some other local entity, e.g., 'Repeater1'.
contextLocalTime .1.3.6.1.6.3.3.2.2.1.1.6
If the value of the corresponding instance of the contextViewIndex is greater than zero, then the value of an instance of this object identifies the temporal context of the management information in the MIB view.
contextProxyDstParty .1.3.6.1.6.3.3.2.2.1.1.7
If the value of the corresponding instance of the contextViewIndex is equal to zero, then the value of an instance of this object identifies a SNMPv2 party which is the proxy destination of a proxy relationship. If the value of the corresponding instance of the contextViewIndex is greater than zero, then the value of an instance of this object is { 0 0 }.
contextProxySrcParty .1.3.6.1.6.3.3.2.2.1.1.8
If the value of the corresponding instance of the contextViewIndex is equal to zero, then the value of an instance of this object identifies a SNMPv2 party which is the proxy source of a proxy relationship. Interpretation of an instance of this object depends upon the value of the transport domain associated with the SNMPv2 party used as the proxy destination in this proxy relationship. If the value of the corresponding instance of the contextViewIndex is greater than zero, then the value of an instance of this object is { 0 0 }.
contextProxyContext .1.3.6.1.6.3.3.2.2.1.1.9
If the value of the corresponding instance of the contextViewIndex is equal to zero, then the value of an instance of this object identifies the context of a proxy relationship. Interpretation of an instance of this object depends upon the value of the transport domain associated with the SNMPv2 party used as the proxy destination in this proxy relationship. If the value of the corresponding instance of the contextViewIndex is greater than zero, then the value of an instance of this object is { 0 0 }.
contextStorageType .1.3.6.1.6.3.3.2.2.1.1.10
The storage type for this conceptual row in the contextTable.
contextStatus .1.3.6.1.6.3.3.2.2.1.1.11
The status of this conceptual row in the contextTable. A context is not qualified for activation until instances of all corresponding columns have the appropriate value. In particular, if the context's contextViewIndex is greater than zero, then the viewStatus column of the associated conceptual row(s) in the viewTable must have the value `active'. Until instances of all corresponding columns are appropriately configured, the value of the corresponding instance of the contextStatus column is `notReady'.
aclTarget .1.3.6.1.6.3.3.2.3.1.1.1
The value of an instance of this object identifies a SNMPv2 party which is the target of an access control policy, and has the same value as the instance of the partyIndex object for that party.
aclSubject .1.3.6.1.6.3.3.2.3.1.1.2
The value of an instance of this object identifies a SNMPv2 party which is the subject of an access control policy, and has the same value as the instance of the partyIndex object for that SNMPv2 party.
aclResources .1.3.6.1.6.3.3.2.3.1.1.3
The value of an instance of this object identifies a SNMPv2 context in an access control policy, and has the same value as the instance of the contextIndex object for that SNMPv2 context.
aclPrivileges .1.3.6.1.6.3.3.2.3.1.1.4
The access privileges which govern what management operations a particular target party may perform with respect to a particular SNMPv2 context when requested by a particular subject party. These privileges are specified as a sum of values, where each value specifies a SNMPv2 PDU type by which the subject party may request a permitted operation. The value for a particular PDU type is computed as 2 raised to the value of the ASN.1 context-specific tag for the appropriate SNMPv2 PDU type. The values (for the tags defined in [5]) are defined in [3] as: Get : 1 GetNext : 2 Response : 4 Set : 8 unused : 16 GetBulk : 32 Inform : 64 SNMPv2-Trap : 128 The null set is represented by the value zero.
aclStorageType .1.3.6.1.6.3.3.2.3.1.1.5
The storage type for this conceptual row in the aclTable.
aclStatus .1.3.6.1.6.3.3.2.3.1.1.6
The status of this conceptual row in the aclTable.
viewIndex .1.3.6.1.6.3.3.2.4.1.1.1
A unique value for each MIB view. The value for each MIB view must remain constant at least from one re-initialization of the entity's network management system to the next re-initialization.
viewSubtree .1.3.6.1.6.3.3.2.4.1.1.2
A MIB subtree.
viewMask .1.3.6.1.6.3.3.2.4.1.1.3
The bit mask which, in combination with the corresponding instance of viewSubtree, defines a family of view subtrees. Each bit of this bit mask corresponds to a sub- identifier of viewSubtree, with the most significant bit of the i-th octet of this octet string value (extended if necessary, see below) corresponding to the (8*i - 7)-th sub-identifier, and the least significant bit of the i-th octet of this octet string corresponding to the (8*i)-th sub-identifier, where i is in the range 1 through 16. Each bit of this bit mask specifies whether or not the corresponding sub-identifiers must match when determining if an OBJECT IDENTIFIER is in this family of view subtrees; a '1' indicates that an exact match must occur; a '0' indicates 'wild card', i.e., any sub-identifier value matches. Thus, the OBJECT IDENTIFIER X of an object instance is contained in a family of view subtrees if the following criteria are met: for each sub-identifier of the value of viewSubtree, either: the i-th bit of viewMask is 0, or the i-th sub-identifier of X is equal to the i-th sub-identifier of the value of viewSubtree. If the value of this bit mask is M bits long and there are more than M sub-identifiers in the corresponding instance of viewSubtree, then the bit mask is extended with 1's to be the required length. Note that when the value of this object is the zero-length string, this extension rule results in a mask of all-1's being used (i.e., no 'wild card'), and the family of view subtrees is the one view subtree uniquely identified by the corresponding instance of viewSubtree.
viewType .1.3.6.1.6.3.3.2.4.1.1.4
The status of a particular family of view subtrees within the particular SNMPv2 context's MIB view. The value 'included(1)' indicates that the corresponding instances of viewSubtree and viewMask define a family of view subtrees included in the MIB view. The value 'excluded(2)' indicates that the corresponding instances of viewSubtree and viewMask define a family of view subtrees excluded from the MIB view.
viewStorageType .1.3.6.1.6.3.3.2.4.1.1.5
The storage type for this conceptual row in the viewTable.
viewStatus .1.3.6.1.6.3.3.2.4.1.1.6
The status of this conceptual row in the viewTable.
Table
partyTable .1.3.6.1.6.3.3.2.1.1
The SNMPv2 Party database.
contextTable .1.3.6.1.6.3.3.2.2.1
The SNMPv2 Context database.
aclTable .1.3.6.1.6.3.3.2.3.1
The access privileges database.
viewTable .1.3.6.1.6.3.3.2.4.1
Locally held information about the MIB views known to this SNMPv2 entity. Each SNMPv2 context which is locally accessible has a single MIB view which is defined by two collections of view subtrees: the included view subtrees, and the excluded view subtrees. Every such subtree, both included and excluded, is defined in this table. To determine if a particular object instance is in a particular MIB view, compare the object instance's OBJECT IDENTIFIER with each of the MIB view's entries in this table. If none match, then the object instance is not in the MIB view. If one or more match, then the object instance is included in, or excluded from, the MIB view according to the value of viewType in the entry whose value of viewSubtree has the most sub- identifiers. If multiple entries match and have the same number of sub-identifiers, then the lexicographically greatest instance of viewType determines the inclusion or exclusion. An object instance's OBJECT IDENTIFIER X matches an entry in this table when the number of sub- identifiers in X is at least as many as in the value of viewSubtree for the entry, and each sub- identifier in the value of viewSubtree matches its corresponding sub-identifier in X. Two sub- identifiers match either if the corresponding bit of viewMask is zero (the 'wild card' value), or if they are equal. Due to this 'wild card' capability, we introduce the term, a 'family' of view subtrees, to refer to the set of subtrees defined by a particular combination of values of viewSubtree and viewMask. In the case where no 'wild card' is defined in viewMask, the family of view subtrees reduces to a single view subtree.
Object Identifier
partyMIB .1.3.6.1.6.3.3
The MIB module describing SNMPv2 parties.
partyAdmin .1.3.6.1.6.3.3.1
partyProtocols .1.3.6.1.6.3.3.1.1
noAuth .1.3.6.1.6.3.3.1.1.1
noPriv .1.3.6.1.6.3.3.1.1.2
desPrivProtocol .1.3.6.1.6.3.3.1.1.3
v2md5AuthProtocol .1.3.6.1.6.3.3.1.1.4
temporalDomains .1.3.6.1.6.3.3.1.2
currentTime .1.3.6.1.6.3.3.1.2.1
restartTime .1.3.6.1.6.3.3.1.2.2
cacheTime .1.3.6.1.6.3.3.1.2.3
initialPartyId .1.3.6.1.6.3.3.1.3
initialContextId .1.3.6.1.6.3.3.1.4
partyMIBObjects .1.3.6.1.6.3.3.2
snmpParties .1.3.6.1.6.3.3.2.1
snmpContexts .1.3.6.1.6.3.3.2.2
snmpAccess .1.3.6.1.6.3.3.2.3
snmpViews .1.3.6.1.6.3.3.2.4
partyMIBConformance .1.3.6.1.6.3.3.3
partyMIBCompliances .1.3.6.1.6.3.3.3.1
partyMIBGroups .1.3.6.1.6.3.3.3.2
Group
partyMIBGroup .1.3.6.1.6.3.3.3.2.1
The collection of objects allowing the description and configuration of SNMPv2 parties. Note that objects which support proxy relationships are not included in this conformance group.