RFC 1471 (rfc1471) - Page 1 of 25
The Definitions of Managed Objects for the Link Control Protocol of the Point-to-Point Protocol
Alternative Format: Original Text Document
Network Working Group F. Kastenholz
Request for Comments: 1471 FTP Software, Inc.
June 1993
The Definitions of Managed Objects for
the Link Control Protocol of
the Point-to-Point Protocol
Status of this Memo
This RFC specifies an IAB standards track protocol for the Internet
community, and requests discussion and suggestions for improvements.
Please refer to the current edition of the "IAB Official Protocol
Standards" for the standardization state and status of this protocol.
Distribution of this memo is unlimited.
Abstract
This memo defines a portion of the Management Information Base (MIB)
for use with network management protocols in TCP/IP-based internets.
In particular, it describes managed objects used for managing the
Link Control Protocol and Link Quality Monitoring on subnetwork
interfaces that use the family of Point-to-Point Protocols [8, 9, 10,
11, & 12].
Table of Contents
1. The Network Management Framework ...................... 2
2. Objects ............................................... 2
2.1 Format of Definitions ................................ 2
3. Overview .............................................. 2
3.1 Object Selection Criteria ............................ 2
3.2 Structure of the PPP ................................. 3
3.3 MIB Groups ........................................... 4
3.4 Relationship to Interface and Interface Extensions
Groups ............................................... 5
4. Definitions ........................................... 6
4.1 PPP Link Group ....................................... 7
4.2 PPP LQR Group ........................................ 16
4.3 PPP LQR Extensions Group ............................. 21
4.4 PPP Tests ............................................ 22
4.4.1 PPP Echo Test ...................................... 22
4.4.2 PPP Discard Test ................................... 23
5. Acknowledgements ...................................... 23
6. Security Considerations ............................... 23
7. References ............................................ 24
8. Author's Address ...................................... 25
Kastenholz