Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

SNMPv3 Applications (RFC2273)

IP.com Disclosure Number: IPCOM000002834D
Original Publication Date: 1998-Jan-01
Included in the Prior Art Database: 2000-Sep-13

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

D. Levi: AUTHOR [+3]

Abstract

This memo describes five types of SNMP applications which make use of an SNMP engine as described in [RFC2271]. The types of application described are Command Generators, Command Responders, Notification Originators, Notification Receivers, and Proxy Forwarders.

This text was extracted from a ASCII document.
This is the abbreviated version, containing approximately 2% of the total text.

Network Working Group D. Levi

Request for Comments: 2273 SNMP Research, Inc.

Obsoletes: 2263 P. Meyer

Category: Standards Track Secure Computing Corporation

B. Stewart

Cisco Systems

January 1998

SNMPv3 Applications

Status of this Memo

This document specifies an Internet standards track protocol for the

Internet community, and requests discussion and suggestions for

improvements. Please refer to the current edition of the "Internet

Official Protocol Standards" (STD 1) for the standardization state

and status of this protocol. Distribution of this memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (1998). All Rights Reserved.

IANA Note

Due to a clerical error in the assignment of the snmpModules in this

memo, this RFC provides the corrected number assignments for this

protocol. This memo obsoletes RFC 2263.

Abstract

This memo describes five types of SNMP applications which make use of

an SNMP engine as described in [RFC2271]. The types of application

described are Command Generators, Command Responders, Notification

Originators, Notification Receivers, and Proxy Forwarders.

This memo also defines MIB modules for specifying targets of

management operations, for notification filtering, and for proxy

forwarding.

Table of Contents

1 Overview ..................................................... 2

1.1 Command Generator Applications ............................. 3

1.2 Command Responder Applications ............................. 3

1.3 Notification Originator Applications ....................... 3

1.4 Notification Receiver Applications ......................... 3

1.5 Proxy Forwarder Applications ............................... 3

2 Management Targets ........................................... 5

3 Elements Of Procedure ........................................ 6

3.1 Command Generator Applications ............................. 6

3.2 Command Responder Applications ............................. 8

3.3 Notification Originator Applications ....................... 13

3.4 Notification Receiver Applications ......................... 16

3.5 Proxy Forwarder Applications ............................... 18

3.5.1 Request Forwarding ....................................... 19

3.5.1.1 Processin...