417 lines
15 KiB
Plaintext
417 lines
15 KiB
Plaintext
|
LINKSYS-SECSD-MIB DEFINITIONS ::= BEGIN
|
||
|
|
||
|
-- -------------------------------------------------------------
|
||
|
-- Security Sensitive Data MIB
|
||
|
-- Title: Linksys Security Sensitive Data
|
||
|
-- This Private MIB manages the Security Sensitive Data access.
|
||
|
-- Version: 7.50
|
||
|
-- Date: 31 Aug 2011
|
||
|
--
|
||
|
-- -------------------------------------------------------------
|
||
|
|
||
|
|
||
|
IMPORTS
|
||
|
rnd FROM LINKSYS-MIB
|
||
|
TEXTUAL-CONVENTION,DisplayString FROM SNMPv2-TC
|
||
|
EnabledStatus FROM P-BRIDGE-MIB
|
||
|
TruthValue, RowStatus FROM SNMPv2-TC
|
||
|
OBJECT-TYPE FROM SNMPv2-SMI;
|
||
|
|
||
|
|
||
|
rlSecSd MODULE-IDENTITY
|
||
|
LAST-UPDATED "201108310000Z"
|
||
|
ORGANIZATION "Linksys LLC."
|
||
|
CONTACT-INFO
|
||
|
"www.Linksys.com"
|
||
|
DESCRIPTION
|
||
|
"The private MIB module definition for Security Sensitive Data (SSD),
|
||
|
contains the MIB tables and scalars to manage the access through
|
||
|
the different management channels as CLI, WEB and others,
|
||
|
for sensitive data as user names and passwords in system."
|
||
|
REVISION "201108310000Z"
|
||
|
DESCRIPTION
|
||
|
"Initial revision."
|
||
|
::= { rnd 209 }
|
||
|
|
||
|
RlSecSdRuleUserType ::= TEXTUAL-CONVENTION
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The Security Sensitive Data channels access users.
|
||
|
user-name - the rule is per rlSecSdRuleUserName.
|
||
|
default-user - the rule is per the default system user name.
|
||
|
all-users - all users which their user level permission is less then 15.
|
||
|
level-15-users - users which their user level permission is 15."
|
||
|
SYNTAX INTEGER {
|
||
|
user-name(1),
|
||
|
default-user(2),
|
||
|
level-15-users(3),
|
||
|
all-users(4)
|
||
|
}
|
||
|
|
||
|
RlSecSdChannelType ::= TEXTUAL-CONVENTION
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The Security Sensitive Data channels:
|
||
|
secure - secure channels as console, ssh, scp, https.
|
||
|
insecure - insecure channels as telnet, http.
|
||
|
secure-xml-snmp - SNMPv3 with privacy or XML over https.
|
||
|
insecure-xml-snmp - SNMPv1/v2/v3 without privacy, xml over http."
|
||
|
SYNTAX INTEGER {
|
||
|
secure-xml-snmp(1),
|
||
|
secure(2),
|
||
|
insecure(3),
|
||
|
insecure-xml-snmp(4)
|
||
|
}
|
||
|
|
||
|
RlSecSdAccessType ::= TEXTUAL-CONVENTION
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The Security Sensitive Data channels default read/write access action:
|
||
|
exclude - Security Sensitive Data can not retrieved/set.
|
||
|
include-encrypted - SSD can retrieved/set as encrypted only.
|
||
|
include-decrypted - SSD can retrieved/set as decrypted only."
|
||
|
SYNTAX INTEGER {
|
||
|
exclude(1),
|
||
|
include-encrypted(2),
|
||
|
include-decrypted(3)
|
||
|
}
|
||
|
|
||
|
RlSecSdPermitAccessType ::= TEXTUAL-CONVENTION
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The Security Sensitive Data channels access permit read/write action:
|
||
|
exclude - Security Sensitive Data can not retrieved/set.
|
||
|
include-encrypted - SSD can retrieved/set as encrypted only.
|
||
|
include-decrypted - SSD can retrieved/set as decrypted only.
|
||
|
include-all - SSD can retrieved/set as encrypted or as decrypted."
|
||
|
SYNTAX INTEGER {
|
||
|
exclude(1),
|
||
|
include-encrypted(2),
|
||
|
include-decrypted(3),
|
||
|
include-all(4)
|
||
|
}
|
||
|
|
||
|
RlSecSdSessionAccessType ::= TEXTUAL-CONVENTION
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The Security Sensitive Data (SSD) channels access per session:
|
||
|
exclude - Security Sensitive Data can not retrieved.
|
||
|
include-encrypted - SSD can retrieved as encrypted only.
|
||
|
include-decrypted - SSD can retrieved as decrypted only.
|
||
|
default - Set to the default SSD access as defined by the SSD rules."
|
||
|
SYNTAX INTEGER {
|
||
|
exclude(1),
|
||
|
include-encrypted(2),
|
||
|
include-decrypted(3),
|
||
|
default(4)
|
||
|
}
|
||
|
|
||
|
RlSecSdRuleOwnerType ::= TEXTUAL-CONVENTION
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The Security Sensitive Data rule owner:
|
||
|
default - default rule which is defined by the device.
|
||
|
user - rule which is defined by user."
|
||
|
SYNTAX INTEGER {
|
||
|
default(1),
|
||
|
user(2)
|
||
|
}
|
||
|
|
||
|
--------------------------------------------------------------------------------
|
||
|
-- rlSecSd Tables --
|
||
|
--------------------------------------------------------------------------------
|
||
|
|
||
|
----------------------------------
|
||
|
-- rlSecSdRulesTable --
|
||
|
----------------------------------
|
||
|
rlSecSdRulesTable OBJECT-TYPE
|
||
|
SYNTAX SEQUENCE OF RlSecSdRulesEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The table holding the Security Sensitive Data access rules per:
|
||
|
user name / user level and management channel.
|
||
|
Allow to add/edit/remove Security Sensitive Data rules."
|
||
|
::= {rlSecSd 1 }
|
||
|
|
||
|
rlSecSdRulesEntry OBJECT-TYPE
|
||
|
SYNTAX RlSecSdRulesEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"An entry in the rlSecSdRulesTable."
|
||
|
INDEX { rlSecSdRuleUser,
|
||
|
rlSecSdRuleUserName,
|
||
|
rlSecSdRuleChannel
|
||
|
}
|
||
|
::= {rlSecSdRulesTable 1 }
|
||
|
|
||
|
RlSecSdRulesEntry ::= SEQUENCE {
|
||
|
rlSecSdRuleUser RlSecSdRuleUserType,
|
||
|
rlSecSdRuleUserName DisplayString,
|
||
|
rlSecSdRuleChannel RlSecSdChannelType,
|
||
|
rlSecSdRuleRead RlSecSdAccessType,
|
||
|
rlSecSdRulePermitRead RlSecSdPermitAccessType,
|
||
|
rlSecSdRuleIsDefault TruthValue,
|
||
|
rlSecSdRuleOwner RlSecSdRuleOwnerType,
|
||
|
rlSecSdRuleStatus RowStatus
|
||
|
}
|
||
|
|
||
|
rlSecSdRuleUser OBJECT-TYPE
|
||
|
SYNTAX RlSecSdRuleUserType
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Contains the Rule user type as described in RlSecSdRuleUserType."
|
||
|
::= { rlSecSdRulesEntry 1 }
|
||
|
|
||
|
rlSecSdRuleUserName OBJECT-TYPE
|
||
|
SYNTAX DisplayString (SIZE(0..39))
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION "Contains the Rule user name when rlSecSdRuleUser value is user-name,
|
||
|
Otherwise it contains an empty string"
|
||
|
::= { rlSecSdRulesEntry 2 }
|
||
|
|
||
|
rlSecSdRuleChannel OBJECT-TYPE
|
||
|
SYNTAX RlSecSdChannelType
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Contains the Rule management channel type as described in RlSecSdChannelType.
|
||
|
secure-xml-snmp and insecure-xml-snmp management channels have no include-encrypted capability
|
||
|
thus their rlSecSdRulePermitRead and rlSecSdRuleRead can have only RlSecSdAccessType values of
|
||
|
exclude or include-decrypted."
|
||
|
::= { rlSecSdRulesEntry 3 }
|
||
|
|
||
|
rlSecSdRuleRead OBJECT-TYPE
|
||
|
SYNTAX RlSecSdAccessType
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Contains the Rule default read access level as described in RlSecSdAccessType,
|
||
|
must be lower or equal access from rlSecSdRulePermitRead"
|
||
|
::= { rlSecSdRulesEntry 4}
|
||
|
|
||
|
rlSecSdRulePermitRead OBJECT-TYPE
|
||
|
SYNTAX RlSecSdPermitAccessType
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Contains the Rule maximum permission access level as described in RlSecSdPermitAccessType."
|
||
|
::= { rlSecSdRulesEntry 5}
|
||
|
|
||
|
|
||
|
rlSecSdRuleIsDefault OBJECT-TYPE
|
||
|
SYNTAX TruthValue
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"true - Rule has created by the by the system.
|
||
|
false - Rule has created by the user."
|
||
|
::= { rlSecSdRulesEntry 6}
|
||
|
|
||
|
|
||
|
rlSecSdRuleOwner OBJECT-TYPE
|
||
|
SYNTAX RlSecSdRuleOwnerType
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Contains the current Rule ownership as defined in RlSecSdRuleOwnerType.
|
||
|
when rlSecSdRuleIsDefault is true, rlSecSdRuleOwner allowed to change
|
||
|
default rule to user rule and vice versa."
|
||
|
::= { rlSecSdRulesEntry 7}
|
||
|
|
||
|
rlSecSdRuleStatus OBJECT-TYPE
|
||
|
SYNTAX RowStatus
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The status of a table entry.
|
||
|
It is used to Add/Edit/Delete an entry from this table."
|
||
|
::= { rlSecSdRulesEntry 8}
|
||
|
|
||
|
|
||
|
----------------------------------
|
||
|
-- rlSecSdMngSessionsTable --
|
||
|
----------------------------------
|
||
|
rlSecSdMngSessionsTable OBJECT-TYPE
|
||
|
SYNTAX SEQUENCE OF RlSecSdMngSessionsEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"The table holding Security Sensitive Data management sessions.
|
||
|
Allowing to get management channel, user name, user level."
|
||
|
::= {rlSecSd 2 }
|
||
|
|
||
|
rlSecSdMngSessionsEntry OBJECT-TYPE
|
||
|
SYNTAX RlSecSdMngSessionsEntry
|
||
|
MAX-ACCESS not-accessible
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"An entry in the rlSecSdMngSessionsTable."
|
||
|
INDEX { rlSecSdMngSessionId }
|
||
|
::= {rlSecSdMngSessionsTable 2}
|
||
|
|
||
|
RlSecSdMngSessionsEntry ::= SEQUENCE {
|
||
|
rlSecSdMngSessionId INTEGER,
|
||
|
rlSecSdMngSessionUserLevel INTEGER,
|
||
|
rlSecSdMngSessionUserName DisplayString,
|
||
|
rlSecSdMngSessionChannel RlSecSdChannelType
|
||
|
}
|
||
|
|
||
|
rlSecSdMngSessionId OBJECT-TYPE
|
||
|
SYNTAX INTEGER
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Contains the Security Sensitive Data management session identifier,
|
||
|
rlSecSdCurrentSessionId is used to get the current management session identifier"
|
||
|
::= { rlSecSdMngSessionsEntry 1 }
|
||
|
|
||
|
rlSecSdMngSessionUserLevel OBJECT-TYPE
|
||
|
SYNTAX INTEGER
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Contains the Security Sensitive Data management session user access level."
|
||
|
::= { rlSecSdMngSessionsEntry 2 }
|
||
|
|
||
|
rlSecSdMngSessionUserName OBJECT-TYPE
|
||
|
SYNTAX DisplayString (SIZE(0..160))
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Contains the Security Sensitive Data management session user name."
|
||
|
::= { rlSecSdMngSessionsEntry 3 }
|
||
|
|
||
|
rlSecSdMngSessionChannel OBJECT-TYPE
|
||
|
SYNTAX RlSecSdChannelType
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Contains the Security Sensitive Data management session channel type as described in RlSecSdChannelType."
|
||
|
::= { rlSecSdMngSessionsEntry 4 }
|
||
|
|
||
|
--------------------------------------------------------------------------------
|
||
|
-- rlSecSd Scalars --
|
||
|
--------------------------------------------------------------------------------
|
||
|
|
||
|
----------------------------------
|
||
|
-- rlSecSdSessionControl --
|
||
|
----------------------------------
|
||
|
|
||
|
rlSecSdSessionControl OBJECT-TYPE
|
||
|
SYNTAX RlSecSdSessionAccessType
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Action scalar which set the default read access of Security Sensitive Data.
|
||
|
Affect only on session which from this scalar is configured.
|
||
|
Scalar Get value is the default-display/read of the session which from
|
||
|
this scalar is retrieved."
|
||
|
::= { rlSecSd 3 }
|
||
|
|
||
|
----------------------------------
|
||
|
-- rlSecSdCurrentSessionId --
|
||
|
----------------------------------
|
||
|
|
||
|
rlSecSdCurrentSessionId OBJECT-TYPE
|
||
|
SYNTAX INTEGER
|
||
|
MAX-ACCESS read-only
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Get the current SSD management channel identifier,
|
||
|
used to get information from rlSecSdMngSessionsTable."
|
||
|
::= { rlSecSd 4 }
|
||
|
|
||
|
|
||
|
----------------------------------
|
||
|
-- rlSecSdPassPhrase --
|
||
|
----------------------------------
|
||
|
rlSecSdPassPhrase OBJECT-TYPE
|
||
|
SYNTAX DisplayString(SIZE(0..160))
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Set the passphrase for the SSD encryptyption / decryption key.
|
||
|
on set, passphrase is in plain text format.
|
||
|
on get, passphrase is encrypted."
|
||
|
DEFVAL{""}
|
||
|
::= { rlSecSd 5 }
|
||
|
|
||
|
----------------------------------
|
||
|
-- rlSecSdFilePassphraseControl --
|
||
|
----------------------------------
|
||
|
rlSecSdFilePassphraseControl OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
restricted(1),
|
||
|
unrestricted(2)
|
||
|
}
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"File Passphrase control provides an additional level of protection on passphrase and configurations.
|
||
|
restricted - a device restricts its passphrase from being inserted into a configuration file.
|
||
|
unrestricted - (default) a device will include its passphrase when creating a configuration file."
|
||
|
DEFVAL { unrestricted }
|
||
|
::= { rlSecSd 6 }
|
||
|
|
||
|
----------------------------------
|
||
|
-- rlSecSdFileIntegrityControl --
|
||
|
----------------------------------
|
||
|
rlSecSdFileIntegrityControl OBJECT-TYPE
|
||
|
SYNTAX INTEGER {
|
||
|
enable(1),
|
||
|
disable(2)
|
||
|
}
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"File integrity control provides a validation of configuration file.
|
||
|
enable - Validate the configuration file digest when downloading the file to startup configuration.
|
||
|
disable - Do not validate."
|
||
|
DEFVAL { enable }
|
||
|
::= { rlSecSd 7 }
|
||
|
|
||
|
---------------------------------------
|
||
|
-- rlSecSdConfigurationFileSsdDigest --
|
||
|
---------------------------------------
|
||
|
rlSecSdConfigurationFileSsdDigest OBJECT-TYPE
|
||
|
SYNTAX DisplayString(SIZE(0..160))
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"SSD block in configuration file integrity digest, auxiliary action scalar for
|
||
|
internal system using during configuration download."
|
||
|
DEFVAL{""}
|
||
|
::= { rlSecSd 8 }
|
||
|
|
||
|
------------------------------------
|
||
|
-- rlSecSdConfigurationFileDigest --
|
||
|
------------------------------------
|
||
|
rlSecSdConfigurationFileDigest OBJECT-TYPE
|
||
|
SYNTAX DisplayString(SIZE(0..160))
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"SSD configuration file integrity digest, auxiliary action scalar for
|
||
|
internal system using during configuration download."
|
||
|
DEFVAL{""}
|
||
|
::= { rlSecSd 9 }
|
||
|
|
||
|
----------------------------------
|
||
|
-- rlSecSdFileIndicator --
|
||
|
----------------------------------
|
||
|
rlSecSdFileIndicator OBJECT-TYPE
|
||
|
SYNTAX DisplayString(SIZE(0..39))
|
||
|
MAX-ACCESS read-write
|
||
|
STATUS current
|
||
|
DESCRIPTION
|
||
|
"Retrieve configuration file SSD indicator.
|
||
|
set value: configuration file name.
|
||
|
get value: Exclude, Encrypted, Plaintext"
|
||
|
::= { rlSecSd 10 }
|
||
|
|
||
|
END
|