RFC 1665 (rfc1665) - Page 1 of 67


Definitions of Managed Objects for SNA NAUs using SMIv2



Alternative Format: Original Text Document



Network Working Group                                    Z. Kielczewski
Request for Comments: 1665                 Eicon Technology Corporation
Category: Standards Track                                    D. Kostick
                                           Bell Communications Research
                                                                K. Shih
                                                                 Novell
                                                                Editors
                                                              July 1994


                     Definitions of Managed Objects
                        for SNA NAUs using SMIv2

Status of this Memo

   This document specifies an Internet standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements.  Please refer to the current edition of the "Internet
   Official Protocol Standards" (STD 1) for the standardization state
   and status of this protocol.  Distribution of this memo is unlimited.

Table of Contents

   1. Introduction ................................................    2
   2. The SNMPv2 Network Management Framework .....................    2
   2.1 Object Definitions .........................................    2
   3. Overview ....................................................    3
   3.1 Applying MIB II to managing SNA NAUs .......................    4
   3.2 SNANAU MIB Structure .......................................    4
   3.2.1 snaNode group ............................................    5
   3.2.2 snaLu group ..............................................    6
   3.2.3 snaMgtTools group ........................................    7
   3.2.4 Conformance statement ....................................    7
   3.3 SNANAU MIB special feature .................................    7
   3.3.1 Row Creation mechanism ...................................    8
   3.3.2 State Diagrams ...........................................    8
   4. Object Definitions ..........................................    9
   5. Acknowledgments .............................................   66
   6. References ..................................................   66
   7. Security Considerations .....................................   67
   8. Authors' Addresses ..........................................   67










Kielczewski, Kostick & Shih