Cabletron Systems reserves the right to make changes in specifications and other information
contained in this document without prior notice. The reader should in all cases consult Cabletron
Systems to determine whether any such changes have been made.
The hardware, firmware, or software described in this manual is subject to change without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL,
INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT
NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR
THE INFORMATION CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN
ADVISED OF, KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH
DAMAGES.
Copyright 1997 by Cabletron Systems, Inc., P.O. Box 5005, Rochester, NH 03866-5005
All Rights Reserved
Printed in the United States of America
Order Number: 9032244-01 September 1997
Cabletron Systems, SPECTRUM,
SmartSTACK, ELS10-26TX, FEPIM, FEPIM-TX and FEPIM-FX
Cabletron Systems, Inc.
All other product names mentioned in this manual may be trademarks or registered trademarks of
their respective companies.
This device complies with Part 15 of the FCC rules. Operation is subject to the following two
conditions: (1) this device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
NOTE:
This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial environment.
This equipment uses, generates, and can radiate radio frequency energy and if not installed in
accordance with the operator’s manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause interference in which case the user
will be required to correct the interference at his own expense.
WARNING:
party responsible for compliance could void the user’s authority to operate the equipment.
Changes or modifications made to this device which are not e xpressly appro v ed by the
and
LANVIEW
FCC NOTICE
are registered trademarks and
are trademarks of
Printed onRecycled Paper
i
Notice
DOC NOTICE
This digital apparatus does not exceed the Class A limits for radio noise emissions from digital
apparatus set out in the Radio Interference Regulations of the Canadian Department of
Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables
aux appareils numériques de la class A prescrites dans le Règlement sur le brouillage radioélectrique
édicté par le ministère des Communications du Canada.
VCCI NOTICE
This is a Class A product based on the standard of the Voluntary Control Council for Interference by
Information Technology Equipment (VCCI). If this equipment is used in a domestic environment,
radio disturbance may arise. When such trouble occurs, the user may be required to take corrective
actions.
CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT
IMPORTANT:
This document is an agreement between you, the end user, and Cabletron Systems, Inc. (“Cabletron”)
that sets forth your rights and obligations with respect to the Cabletron software program (the
“Program”) contained in this package. The Program may be contained in firmware, chips or other
media. BY UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME
BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND
THE LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT
AGREE TO THE TERMS OF THIS AGREEMENT, PROMPTLY RETURN THE UNUSED
PRODUCT TO THE PLACE OF PURCHASE FOR A FULL REFUND.
Before utilizing this product, carefully read this License Agreement.
ii
Notice
CABLETRON SOFTWARE PROGRAM LICENSE
1.LICENSE
package subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the
Copyright Act of the United States or as authorized in writing by Cabletron.
2.OTHER RESTRICTIONS. You may not reverse engineer, decompile, or disassemble the
Program.
3.APPLICABLE LA W. This License Agreement shall be interpreted and governed under the laws
and in the state and federal courts of New Hampshire. You accept the personal jurisdiction and
venue of the New Hampshire courts.
. You have the right to use only the one (1) copy of the Program provided in this
EXCLUSION OF WARRANTY AND DISCLAIMER OF LIABILITY
1.EXCLUSION OF
writing, Cabletron makes no warranty, expressed or implied, concerning the Program (including
its documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO
YOU BY CABLETRON IN WRITING, EITHER EXPRESSED OR IMPLIED, INCLUDING
BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE PROGRAM, THE
ACCOMP ANYING WRITTEN MA TERIALS, AND ANY A CCOMP ANYING HARDWARE.
2.NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL
CABLETRON OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER
(INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS,
PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL,
INCIDENTAL, CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS)
ARISING OUT OF THE USE OR INABILITY TO USE THIS CABLETRON PRODUCT,
EVEN IF CABLETRON HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, OR
ON THE DURATION OR LIMITATION OF IMPLIED WARRANTIES, IN SOME
INSTANCES THE ABOVE LIMITATIONS AND EXCLUSIONS MAY NOT APPLY TO
YOU.
WARRANTY. Except as may be specifically provided by Cabletron in
UNITED STATES GOVERNMENT RESTRICTED RIGHTS
The enclosed product (a) was developed solely at private expense; (b) contains “restricted computer
software” submitted with restricted rights in accordance with Section 52227-19 (a) through (d) of the
Commercial Computer Software - Restricted Rights Clause and its successors, and (c) in all respects
is proprietary data belonging to Cabletron and/or its suppliers.
For Department of Defense units, the product is licensed with “Restricted Rights” as defined in the
DoD Supplement to the Federal Acquisition Regulations, Section 52.227-7013 (c) (1) (ii) and its
successors, and use, duplication, disclosure by the Government is subject to restrictions as set forth in
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at
7.2Enterprise Specific Traps For The ELS10-26.................7-2
vii
Contents
viii
CHAPTER 1
INTRODUCTION
This manual is for system administrators responsible for
configuring, monitoring, and maintaining the ELS10-26. Much of
the configuration of the ELS10-26 needs to be done using an
SNMP-based network management station. This manual contains
the SNMP MIB variables you may need to configure, monitor, and
manage your ELS10-26. You should use this manual with the
ELS10-26 User Guide
your NMS.
The contents of each chapter are described below.
and with the documentation provided with
• Chapter 1,
primitives, describes the functions the MIB variables can be used
to perform, and describes how to use TFTP to download the
ELS10-26 system software.
• Chapter 2,
variables.
• Chapter 3,
variables.
• Chapter 4,
• Chapter 5,
MIB variables.
• Chapter 6,
MIB variables.
• Chapter 7,
traps.
Introduction
TCP/IP MIB-II
Ethernet MIB
Bridge MIB
PPP MIB
ELS10-26 MIB
Traps
, describes generic and enterprise-specific
, provides an overview of the SNMP
, describes the standard TCP/IP MIB
, describes the standard Ethernet MIB
, describes the Bridge MIB variables.
, describes the PPP link control and IP table
, describes the Cabletron enterprise
1-1
Introduction
1.1 RELATED DOCUMENTATION
You may need to refer to the following Cabletron documentation:
•
ELS10-26 User Guide
management instructions for the ELS10-26. It also describes how
to use the Local Console Manager (LCM), which is a
non-intelligent terminal interface to the ELS10-26.
If you need internetworking reference material, you may find the
following books helpful:
This manual describes the software interface between the NMS
and the ELS10-26. This is relevant for an ELS10-26 running Version
1.0 software. The NMS communicates with the ELS10-26 software.
The Network Management, or UART, port is the interface to the
Local Console Manager (LCM). LCM is a non-intelligent terminal
interface that can be used to configure and monitor status for the
ELS10-26.
1-2
Introduction
1.2 GETTING HELP
If you need additional support related to the ELS10-26, or if you
have any questions, comments, or suggestions concerning this
manual, contact Cabletron Systems Global Call Center:
Phone:(603) 332-9400
Internet mail:support@ctron.com
FTP:ctron.com (134.141.197.25)
Login: anonymous
Password: your email address
BBS:(603) 335-3358
Modem setting:8N1: 8 data bits, No parity, 1 stop bit
Before calling Cabletron Systems Global Call Center, have the
following information ready:
• Your Cabletron Systems contract number
• A description of the failure
• The serial and revision numbers of all Cabletron Systems
products in the network
• A description of any action(s) already taken to resolve the
problem (e.g., changing mode switches, rebooting the unit, etc.)
• A description of your network environment (layout, cable type,
etc.)
• Network load and frame size at the time of trouble (if known)
• The device history (i.e., have you returned the device before, is
this a recurring problem, etc.)
• Any previous Return Material Authorization (RMA) numbers
For additional information about Cabletron Systems products,
visit our World Wide Web site: http://www.cabletron.com
1-3
Introduction
1.3 DOCUMENT CONVENTIONS
The following conventions are used throughout this document:
LCM commands, prompts, and information displayed by the
computer appear in Courier typeface, for example:
Current Number of Learned Addresses: 133
Information that you enter appears in Courier bold typeface, for
example:
ELS10-26 >
status
Information that you need to enter with a command is enclosed in
angle brackets < >. For example, you must enter a port number
and an IP address to execute the
ipaddr <port #> <IP address>
command:
ELS10-26 >
ipaddr 6 192.138.217.40
Field value options appear in bold typeface.
The following conventions are also used in this document:
Note:
Calls the reader’s attention to any item of information that may be
of special importance.
Tip:
Caution:
Conveys helpful hints concerning procedures or actions.
Contains information essential to avoid damage to the
equipment.
1-4
Introduction
1.4 SNMP PRIMITIVES
The major software interface between the NMS and ELS10-26
consists of one simple mechanism – the exchange of SNMP (Simple
Network Management Protocol, RFC 1157) datagrams over any
available physical media. The following restrictions apply:
• All datagrams must obey SNMP format.
• All datagrams must be sent via UDP and IP. Thus, all datagrams
will have UDP and IP headers.
• Datagrams may be sent over any of the following physical
media:
-Ethernet/802.3 LAN - the datagram must have an Ethernet
MAC header, with an Ethernet frame type of IP; or, the
datagram must be in 802.3 format with IP-encapsulation as
defined by RFC 1042.
-UART (out-of-band management port) - the datagram must
have a PPP header, which indicates that the datagram
contains an IP packet. (The ELS10-26 automatically detects
the presence of a PPP connection versus being connected to
a non-intelligent terminal.)
The NMS must rely on IP, rather than MAC addressing for all
datagrams sent to an ELS10-26. Therefore:
• All datagrams from the ELS10-26 are addressed to either an
NMS or the broadcast IP address.
• Within the context of this document, the terms “datagram,”
“packet,” and “PDU” are synonymous.
1-5
Introduction
1.5 MIB PRIMITIVE TYPES
The MIB definitions in this document may reference the primitive
types that are described in the Structure and Identification of
Management Information for TCP/IP-based Internets, RFC 1155.
RFC 1155 is based on the Specification of Abstract Syntax Notation
One, ASN.1. The primitive types are described in Table 1-1.
Table 1-1 Primitive Descriptions
PrimitiveSizeDescription
Enumerated Integer with possible true (1)
Boolean 1 byte
or false (2) values; note that the ASN.1
BOOLEAN primitive type is not used
BridgeID 8 bytes
Counter 4 bytes max Unsigned value
DisplayString n X 1 byte Array of printable ascii characters
Gauge 4 bytesNon-negative integer
Integer 4 bytes maxSigned value
IpAddress4 bytesInternet address
MacAddress6 bytes Ethernet address
OctetString n X 1 byte Array of bytes
PhysAddress n X 1 byte
PortID 2 bytes
TimeTicks4 bytes
Priority and MAC address used to identify
a spanning tree bridge
Array of bytes, using the same as a MAC
Address
Priority and port number used to identify a
spanning tree port
Max time counter with a granularity of
1/100th of a second (also known as
centiseconds)
1-6
Introduction
1.6 USER FUNCTIONS
The SNMP primitives may be used to accomplish the following
functions:
• Obtain the ELS10-26’s current value of certain parameters - the
NMS uses the GetRequest or GetNextRequest PDU, and the
ELS10-26 responds with a GetResponse PDU. If the NMS issues
a GetRequest for an unsupported parameter, the ELS10-26 sends
ErrorStatus1. If the NMS
a GetResponse with a noSuchName
issues a GetNextRequest for an unsupported parameter, the
ELS10-26 skips to the next object.
• Change the ELS10-26’s value of certain parameters - the NMS
uses the SetRequest PDU, and the ELS10-26 responds with a
GetResponse PDU. The ELS10-26 will change both its current
value and its local default to be used when the ELS10-26 reboots,
unless noted otherwise.
• Obtain the current value of certain parameters and
simultaneously change the value of other parameters - the NMS
uses the SetRequest PDU, and the ELS10-26 responds with a
GetResponse PDU. For the parameters which are being obtained
rather than changed, the NMS must use the ASN.1 NULL value
with the SetRequest PDU.
• Provide notification of significant events - the ELS10-26 uses the
Trap PDU and/or the GetResponse PDU. The NMS uses the
SetRequest PDU to control the frequency that the ELS10-26 may
send Trap PDUs.
1.
If implementing the parameter is required, it might seem more reasonable to
return a GetResponse with no error and the ASN.1 NULL value as the
parameter’s value; howev er, leading authorities such as Marshall T. Rose (author
of
The Simple Book
existing SNMP management stations do not handle NULL values correctly.
) suggest that noSuchName be returned, because many
1-7
Introduction
The ELS10-26 implements two non-standard features with respect
to the SNMP SetRequest:
• The variable bindings within a SetRequest are sometimes
processed sequentially rather than simultaneously. For example,
if a SetRequest contains two parameters with an incorrect value
specified for the second parameter, the ELS10-26 returns a
badValue error to the NMS; however, the ELS10-26 may have
updated its value for the first parameter.
• The values within the variable bindings of the returned
GetResponse may reflect meaningful information, rather than
being an exact copy of the values from the SetRequest. For
example, if a SetRequest contains two variable bindings, the first
specifying that memory should be examined and the second
specifying the contents of the memory, then the ELS10-26’s
GetResponse will update the value of the second variable
binding to contain the actual contents of the memory.
1-8
Introduction
1.7 NAVIGATING THROUGH THE MIBTREE STRUCTURE
The MIB structure is a hierarchical tree structure. Each MIB
variable has a numeric value that indicates its place in the
hierarchy. The structure was originally created, and is still
maintained by the International Organization for Standardization
(ISO) and the International Telecommunications Union (ITU), two
international standards organizations. You can get and set MIB
variables by navigating down the tree to a specific MIB, a group or
table within that MIB, and then to the individual variable.
Figure 1-1 shows the path down the MIB tree structure. Under the
“mib-2” and the Cabletron enterprise branch, are all the relevant
MIBs that the ELS10-26 supports.
1-9
Introduction
iso
1
org
3
dod
6
internet
1
mgmt
2
mib-2
1
systeminterfacesadd transip
1
234 39
Figure 1-1 MIB Hierarchical Structure
experimental
3
private
4
enterprise
......
1
sigma
97
rdbmsMIB
Table 1-2 provides the branch structure that is under MIB-II. To
reach any of the MIB-II objects you would start with the prefix
1.3.6.1.2.1. For example, to reach an object in the system group, you
would start with 1.3.6.1.2.1.1. To find the amount of time the
ELS10-26 had been running, you would want to get the sysUpTime
variable, which is the third object in the system group. So the get
command would look like:
get 1.3.6.1.2.1.1.3.0
1-10
Introduction
The zero at the end (.0), indicates that this is a single instance, and
that only one value can be returned. Whenever you are looking for
a variable with only one value, you must include the .0 at the end.
Some variables may have multiple values, such as an IP address
and an associated port number.
Table 1-2 MIB-II Group Descriptions
MIB-II Group Number (1.3.6.1.2.1.)
System1
Interfaces2
Address T r anslation3
Internet Protocol (IP)4
Internet Control Message (ICMP)5
Transmission Control Protocol (TCP)6
User Datagram Protocol (UDP)7
Exterior Gateway Protocol (EGP)8
CMIP over TCP (CMOT)9
Transmission10
SNMP11
GenericIF12
AppleTalk13
Open Shortest Path First (OSPF)14
Border Gateway Protocol (BGP)15
Remote Network Monitoring (RMON)16
Bridge 17
There are additional groups under MIB-II, but all groups are not
supported by the ELS10-26.
1-11
Introduction
The Cabletron MIB is under the private enterprise MIB branch. To
identify a variable in the Cabletron MIB, you would start with the
private enterprise prefix of 1.3.6.1.4.1, and add the specific
Cabletron ID of 97. The result, 1.3.6.1.4.1.97, is the complete prefix
for a Cabletron MIB variable. You would then add the specific
object ID to complete the MIB variable.
For example, to find the sysID currently defined in the ELS10-26,
you would want to get the sysID variable in the Cabletron MIB
group and add it to the prefix 1.3.6.1.4.97. After the prefix, add the
Cabletron MIB, 1.1. As stated above, the zero {0} indicates that this
variable is a single instance and only one variable can be returned.
The get command would look like:
get 1.3.6.1.4.1.97.1.1
At the beginning of each chapter in this Reference Guide, the prefix
for each MIB group is provided. To calculate the specific MIB
variable, you add the specific object ID to the prefix for that MIB
group.
1-12
Introduction
1.8 TFTP
TFTP (Trivial File Transfer Protocol, RFC 1350) is used for:
• Distribution of new software.
• Bulk retrieval of all of the parameters of a ELS10-26.
• Bulk setting of all of the parameters of a ELS10-26.
TFTP has no inherent security provision; however, all files have
special data encryption, and the ELS10-26 will reject files that have
not been encrypted. In addition, SNMP primitives may be used to
prevent the ELS10-26 from accepting unauthorized TFTP requests,
even if the files have the special data encryption. Refer to the
description of the sxswdis branch of Cabletron’s private MIB for
TFTP security details.
Software Distribution
TFTP is used for the distribution of new software. The new
software will be automatically invoked when an ELS10-26 reboots.
New software is released in two files:
• dnld_hdr
• dnld_software
To distribute the new software to an ELS10-26, the TFTP procedure
is as follows:
1. Start TFTP on the NMS, or on any other device which can
provide TFTP services. (Typically, TFTP must be started from
the same directory that contains the files to be transferred.)
TFTP must be told the IP address of the remote host (the IP
address of the ELS10-26), and the file transfer mode (which
must be “binary”).
2. Use TFTP to retrieve all of the ELS10-26’s parameters, as
described in a subsection below. This step is not required, but it
1-13
Introduction
is recommended if you need to go back to the version of
software that is currently being executed by the ELS10-26.
3. Tell TFTP to transfer (“put”) the first file, (dnld_hdr).
4. Wait one minute, or until the ELS10-26 sends the SNMP Trap
described in the swdis branch of SMC’s private MIB. (The Trap
will be sent when the ELS10-26 is ready for the second file,
which will be somewhat shorter than three minutes.)
5. Tell TFTP to transfer the second file, (dnld_software). This
transfer should take approximately one minute.
The initial one minute waiting may be omitted and this second
transfer may be initiated immediately following the first
transfer; however, that causes the second transfer to take
approximately two minutes, and creates a slightly heavier
network load during the file transfer.
Note:
If the above TFTP sequence is abnormally terminated, there is no
cause for alarm, since the ELS10-26 maintains a back-up set of
software, and the ELS10-26 will not use the incomplete new
software.
Older versions of software may be distributed to an ELS10-26,
provided that the older software is at least Version 2.3. To
distribute the older software to an ELS10-26, the above TFTP
procedure should be altered, with the following step being
performed before the older software is distributed.
If the bulk retrieval of all of the parameters of the ELS10-26 had
been performed while the ELS10-26 was executing that older
software, that retrieved file should be used to do a bulk set of all
parameters (as described below). Otherwise, when the older
software is distributed and the ELS10-26 reboots, the older
software will not understand the format of the ELS10-26’s
2
parameters.
1-14
Introduction
1.8.1 Retrieving All Parameters
TFTP is used for retrieval of the parameters of an ELS10-26, as
follows
:
1. Start TFTP (as described earlier). TFTP must be told the IP
address of the remote host (i.e., the ELS10-26), and the file
transfer mode (which must be “binary”).
2. Tell TFTP to retrieve (i.e., “get”) the ELS10-26’s Configuration
file (i.e., file name “config”).
3. After about ten seconds, the TFTP operation will complete.
1.8.2 Setting All Parameters
TFTP is used for bulk setting of all of the parameters of an
ELS10-26, as follows:
1. Start TFTP (as described earlier). TFTP must be told the IP
address of the remote host (i.e., the IP address of the ELS10-26),
and the file transfer mode (which must be “binary”).
2. Tell TFTP to send (i.e., “put”) the ELS10-26’s Configuration file
(i.e., file name “config”).
3. After about twenty seconds, the TFTP operation will complete.
2.
The software will re-initialize all of the ELS10-26’s parameters to the factory
specified defaults.
1-15
Introduction
1.9 ADDITIONAL INTERFACES
In addition to SNMP and TFTP, the ELS10-26 employs the
following protocols, as part of its software interface with an NMS:
only used when no IP addresses have been assigned to the
ELS10-26.
1-16
CHAPTER 2
TCP/IP MIB-II
The ELS10-26 supports the TCP/IP MIB-II, as defined by
Management Information Base for Network Management of TCP/
IP-based Internets MIB-II
March 1991. The MIB is divided into groups of parameters. The
individual groups are described in the subsections below. You may
want to refer to the actual TCP/IP MIB, since this document
paraphrases the standard MIB in order to provide ELS10-26-related
descriptions.
, RFC 1213 (K. McCloghrie, editor), dated
Note:
The MIB tree prefix for reaching the TCP/IP MIB-II is:
The access types of some of the TCP/IP MIB parameters have been
extended from Read-Only to Read-Write. However, unless
otherwise indicated, the access type of all parameters is as indicated
in the standard MIB.
1.3.6.1.2.1.
2.1 SYSTEM GROUP
system{mib-2 1}
The TCP/IP System Group parameters are described below.
sysDescr{system 1}
DisplayString Read-Only
A textual description of the ELS10-26 is Cabletron “moduleName”
Rev “FirmwareRevision” “LinkTimeandDate” i.e., Cabletron
ELS10-26 Rev xx:xx:xx 03/04/97--11:30:25
sysObjectID{system 2}
Object Identifier Read-Only
The identifier of the variable used to identify the type of entity.
Cabletron’s MIB sysID parameter will have a value that indicates
that it is a bridge. So sysObjectID contains the object identifier of
2-1
TCP/IP MIB-II
the Cabletron MIB sysID object, i.e., {1 3 6 1 4 1 97 5 7}. Special
versions of the ELS10-26, made for third-party vendors may use
different values for sysID.
sysUpTime{system 3}
TimeTicks Read-Only
The time, in centiseconds, since the ELS10-26 was last booted.
sysContact{system 4}
DisplayString Read-Write
The name and address of the contact person for the ELS10-26.
sysName{system 5}
DisplayString Read-Write
The Internet name of the contact person for the ELS10-26. The
LCM prompt consists of sysName followed by “>”. (LCM is a
non-intelligent terminal interface that can be used to configure and
monitor status for the ELS10-26.)
sysLocation{system 6}
DisplayString Read-Write
The physical location of the ELS10-26.
sysServices{system 7}
Integer Read-Only
The sum of the services supported by the ELS10-26. Values
include:
(2)the ELS10-26 is a bridge only
2.2 INTERFACES GROUP
interfaces{mib-2 2}
The TCP/IP Interfaces Group parameters are described below.
2-2
TCP/IP MIB-II
ifNumber{interfaces 1}
Integer Read-Only
The number of ports (whether alive or dead), including the UART.
ifTable{interfaces 2}
Not Accessible
A list of interface entries; one per port (ifNumber in total).
ifEntry{ifTable 1}
Not Accessible
A set of objects for an interface entry. The individual components
are described below.
ifIndex{ifEntry 1}
Integer Read-Only
The port number, beginning with 1 for the first port. This number
always matches the instance of the ifEntry. For example, {ifIndex 3}
contains the value “3”.
2-3
TCP/IP MIB-II
ifDescr{ifEntry 2}
DisplayString Read-Only
A textual description of the port. One of the following text strings:
• Ethernet/802.3 TP
• Network Management Port (this is the UART port)
• Fast Ethernet/802.3u TP (twisted pair connection)
• Fast Ethernet/802.3u FX (fiber connection)
• Fast Ethenet/802.3u T4 (2 twisted pairs, category 5)
ifType{ifEntry 3}
Integer Read-Only
The type of the port, i.e., one of the following:
• (6) - ethernet-csmacd
• (23) - ppp (for the UART port).
ifMtu{ifEntry 4}
Integer Read-Only
The size (in bytes) of the largest network datagram which may be
sent or received on the port. This does not include the MAC
header, LLC header, and FCS. For CSMA/CD ports, the Ethernet
Frame Type is considered part of the MAC header, but there is no
LLC header. Specifying a value of zero in a SetRequest indicates
that the interface is to default to the largest MTU available for that
media. The effective value is always returned in the GetResponse.
ifSpeed{ifEntry 5}
Integer Read-Only
The port’s estimated MAC-level bandwidth, in bits per second.
The bandwidth will be in the range 1,200 - 100,000,000.
2-4
Loading...
+ 140 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.