RFC 1442 (rfc1442) - Page 1 of 54
Structure of Management Information for version 2 of the Simple Network Management Protocol (SNMPv2)
Alternative Format: Original Text Document
Network Working Group J. Case
Request for Comments: 1442 SNMP Research, Inc.
K. McCloghrie
Hughes LAN Systems
M. Rose
Dover Beach Consulting, Inc.
S. Waldbusser
Carnegie Mellon University
April 1993
Structure of Management Information
for version 2 of the
Simple Network Management Protocol (SNMPv2)
Status of this Memo
This RFC specifes an IAB standards track protocol for the
Internet community, and requests discussion and suggestions
for improvements. Please refer to the current edition of the
"IAB Official Protocol Standards" for the standardization
state and status of this protocol. Distribution of this memo
is unlimited.
Table of Contents
1 Introduction .......................................... 2
1.1 A Note on Terminology ............................... 3
2 Definitions ........................................... 4
3.1 The MODULE-IDENTITY macro ........................... 5
3.2 Object Names and Syntaxes ........................... 7
3.3 The OBJECT-TYPE macro ............................... 10
3.5 The NOTIFICATION-TYPE macro ......................... 12
3 Information Modules ................................... 13
3.1 Macro Invocation .................................... 13
3.1.1 Textual Clauses ................................... 14
3.2 IMPORTing Symbols ................................... 14
4 Naming Hierarchy ...................................... 16
5 Mapping of the MODULE-IDENTITY macro .................. 17
5.1 Mapping of the LAST-UPDATED clause .................. 17
5.2 Mapping of the ORGANIZATION clause .................. 17
5.3 Mapping of the CONTACT-INFO clause .................. 17
5.4 Mapping of the DESCRIPTION clause ................... 17
5.5 Mapping of the REVISION clause ...................... 17
5.6 Mapping of the DESCRIPTION clause ................... 18
5.7 Mapping of the MODULE-IDENTITY value ................ 18
5.8 Usage Example ....................................... 19
Case, McCloghrie, Rose & Waldbusser [Page i]
RFC 1442 SMI for SNMPv2 April 1993
6 Mapping of the OBJECT-IDENTITY macro .................. 20
6.1 Mapping of the STATUS clause ........................ 20
6.2 Mapping of the DESCRIPTION clause ................... 20
6.3 Mapping of the REFERENCE clause ..................... 20
6.4 Mapping of the OBJECT-IDENTITY value ................ 20
6.5 Usage Example ....................................... 21
7 Mapping of the OBJECT-TYPE macro ...................... 22
7.1 Mapping of the SYNTAX clause ........................ 22
7.1.1 Integer32 and INTEGER ............................. 22
7.1.2 OCTET STRING ...................................... 23
7.1.3 OBJECT IDENTIFIER ................................. 23
7.1.4 BIT STRING ........................................ 23
7.1.5 IpAddress ......................................... 23
7.1.6 Counter32 ......................................... 24
7.1.7 Gauge32 ........................................... 24
7.1.8 TimeTicks ......................................... 24
7.1.9 Opaque ............................................ 25
7.1.10 NsapAddress ...................................... 25
7.1.11 Counter64 ........................................ 26
7.1.12 UInteger32 ....................................... 26
7.2 Mapping of the UNITS clause ......................... 26
7.3 Mapping of the MAX-ACCESS clause .................... 27
7.4 Mapping of the STATUS clause ........................ 27
7.5 Mapping of the DESCRIPTION clause ................... 27
7.6 Mapping of the REFERENCE clause ..................... 28
7.7 Mapping of the INDEX clause ......................... 28
7.7.1 Creation and Deletion of Conceptual Rows .......... 30
7.8 Mapping of the AUGMENTS clause ...................... 31
7.8.1 Relation between INDEX and AUGMENTS clauses ....... 31
7.9 Mapping of the DEFVAL clause ........................ 32
7.10 Mapping of the OBJECT-TYPE value ................... 33
7.11 Usage Example ...................................... 35
8 Mapping of the NOTIFICATION-TYPE macro ................ 37
8.1 Mapping of the OBJECTS clause ....................... 37
8.2 Mapping of the STATUS clause ........................ 37
8.3 Mapping of the DESCRIPTION clause ................... 37
8.4 Mapping of the REFERENCE clause ..................... 37
8.5 Mapping of the NOTIFICATION-TYPE value .............. 38
8.6 Usage Example ....................................... 39
9 Refined Syntax ........................................ 40
10 Extending an Information Module ...................... 41
10.1 Object Assignments ................................. 41
10.2 Object Definitions ................................. 41
10.3 Notification Definitions ........................... 42
Case, McCloghrie, Rose & Waldbusser [Page ii]
RFC 1442 SMI for SNMPv2 April 1993
11 Appendix: de-OSIfying a MIB module ................... 43
11.1 Managed Object Mapping ............................. 43
11.1.1 Mapping to the SYNTAX clause ..................... 44
11.1.2 Mapping to the UNITS clause ...................... 45
11.1.3 Mapping to the MAX-ACCESS clause ................. 45
11.1.4 Mapping to the STATUS clause ..................... 45
11.1.5 Mapping to the DESCRIPTION clause ................ 45
11.1.6 Mapping to the REFERENCE clause .................. 45
11.1.7 Mapping to the INDEX clause ...................... 45
11.1.8 Mapping to the DEFVAL clause ..................... 45
11.2 Action Mapping ..................................... 46
11.2.1 Mapping to the SYNTAX clause ..................... 46
11.2.2 Mapping to the MAX-ACCESS clause ................. 46
11.2.3 Mapping to the STATUS clause ..................... 46
11.2.4 Mapping to the DESCRIPTION clause ................ 46
11.2.5 Mapping to the REFERENCE clause .................. 46
11.3 Event Mapping ...................................... 46
11.3.1 Mapping to the STATUS clause ..................... 47
11.3.2 Mapping to the DESCRIPTION clause ................ 47
11.3.3 Mapping to the REFERENCE clause .................. 47
12 Acknowledgements ..................................... 48
13 References ........................................... 52
14 Security Considerations .............................. 54
15 Authors' Addresses ................................... 54
Case, McCloghrie, Rose & Waldbusser