Definitions of Managed Objects for Bridges
RFC 4188
Document | Type |
RFC - Proposed Standard
(September 2005; Errata)
Obsoletes RFC 1493
|
|
---|---|---|---|
Authors | Les Bell , Kenyon Norseth | ||
Last updated | 2018-12-20 | ||
Stream | IETF | ||
Formats | plain text html pdf htmlized bibtex | ||
Stream | WG state | (None) | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | RFC 4188 (Proposed Standard) | |
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | Bert Wijnen | ||
Send notices to | david.kessens@nokia.com |
Network Working Group K. Norseth, Ed. Request for Comments: 4188 L-3 Communications Obsoletes: 1493 E. Bell, Ed. Category: Standards Track 3Com Europe Limited September 2005 Definitions of Managed Objects for Bridges Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2005). Abstract This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines objects for managing MAC bridges based on the IEEE 802.1D-1998 standard between Local Area Network (LAN) segments. Provisions are made for the support of transparent bridging. Provisions are also made so that these objects apply to bridges connected by subnetworks other than LAN segments. The MIB module presented in this memo is a translation of the BRIDGE-MIB defined in RFC 1493 to the SMIv2 syntax. This memo obsoletes RFC 1493. Norseth & Bell, Eds. Standards Track [Page 1] RFC 4188 Bridge MIB September 2005 Table of Contents 1. The Internet-Standard Management Framework ......................2 2. Conventions .....................................................2 3. Overview ........................................................3 3.1. Structure of the MIB Module ................................3 3.1.1. The dot1dBase Subtree ...............................6 3.1.2. The dot1dStp Subtree ................................6 3.1.3. The dot1dSr Subtree .................................6 3.1.4. The dot1dTp Subtree .................................6 3.1.5. The dot1dStatic Subtree .............................6 3.2. Relationship to Other MIB Modules ..........................6 3.2.1. Relationship to the SNMPv2-MIB ......................7 3.2.2. Relationship to the IF-MIB ..........................7 4. Definitions .....................................................8 5. IANA Considerations ............................................39 6. Security Considerations ........................................39 7. Acknowledgements ...............................................40 8. Contact Information ............................................41 9. Changes from RFC 1493 ..........................................42 10. References ....................................................42 10.1. Normative References .....................................42 10.2. Informative References ...................................43 1. The Internet-Standard Management Framework For a detailed overview of the documents that describe the current Internet-Standard Management Framework, please refer to section 7 of RFC 3410 [RFC3410]. Managed objects are accessed via a virtual information store, termed the Management Information Base or MIB. MIB objects are generally accessed through the Simple Network Management Protocol (SNMP). Objects in the MIB are defined using the mechanisms defined in the Structure of Management Information (SMI). This memo specifies a MIB module that is compliant to the SMIv2, which is described in STD 58, RFC 2578 [RFC2578], STD 58, RFC 2579 [RFC2579] and STD 58, RFC 2580 [RFC2580]. 2. Conventions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL", when they appear in this document, are to be interpreted as described in BCP 14, RFC 2119 [RFC2119]. Norseth & Bell, Eds. Standards Track [Page 2] RFC 4188 Bridge MIB September 2005 3. Overview A common device present in many networks is the Bridge. This device is used to connect Local Area Network segments below the network layer. There are two major modes defined for this bridging: transparent and source route. The transparent method of bridging is defined in the IEEE 802.1D specification [IEEE8021D]. This memo defines those objects needed for the management of a bridging entity that operates in the transparent mode, as well as some objects that apply to all types of bridges. To be consistent with IAB directives and good engineering practices,Show full document text