Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP) (RFC2575)

IP.com Disclosure Number: IPCOM000003162D
Original Publication Date: 1999-Apr-01
Included in the Prior Art Database: 2000-Sep-13
Document File: 30 page(s) / 74K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

B. Wijnen: AUTHOR [+3]

Abstract

This document describes the View-based Access Control Model for use in the SNMP architecture [RFC2571]. It defines the Elements of Procedure for controlling access to management information. This document also includes a MIB for remotely managing the configuration parameters for the View-based Access Control Model.

This text was extracted from a ASCII document.
This is the abbreviated version, containing approximately 4% of the total text.

Network Working Group B. Wijnen

Request for Comments: 2575 IBM T. J. Watson Research

Obsoletes: 2275 R. Presuhn

Category: Standards Track BMC Software, Inc.

K. McCloghrie

Cisco Systems, Inc.

April 1999

View-based Access Control Model (VACM) for the

Simple Network Management Protocol (SNMP)

Status of this Memo

This document specifies an Internet standards track protocol for the

Internet community, and requests discussion and suggestions for

improvements. Please refer to the current edition of the "Internet

Official Protocol Standards" (STD 1) for the standardization state

and status of this protocol. Distribution of this memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (1999). All Rights Reserved.

Abstract

This document describes the View-based Access Control Model for use

in the SNMP architecture [RFC2571]. It defines the Elements of

Procedure for controlling access to management information. This

document also includes a MIB for remotely managing the configuration

parameters for the View-based Access Control Model.

Table of Contents

1. Introduction 2

1.2. Access Control 3

1.3. Local Configuration Datastore 3

2. Elements of the Model 3

2.1. Groups 3

2.2. securityLevel 4

2.3. Contexts 4

2.4. MIB Views and View Families 4

2.4.1. View Subtree 5

2.4.2. ViewTreeFamily 5

2.5. Access Policy 6

3. Elements of Procedure 6

3.1. Overview of isAccessAllowed Process 8

3.2. Processing the isAccessAllowed Service Request 9

4. Definitions 10

5. Intellectual Property 27

6. Acknowledgements 28

7. Security Considerations 29

7.1. Recommended Practices 29

...