Dell-SSH-MIB Table View

Table-centric layout grouping table, row, and column objects.

Tables
12
Rows
12
Columns
54
.1.3.6.1.4.1.89.78.2.1 · 1 row entry · 3 columns
This table contains the router's public key.  Each row in this table
contains a fragment of the key, in printable binhex format.  There may
be up to 160 characters in every fragment, and they are all combined
to form one key.  The key is generated by writing to
rlSshServerRegenerateHostKey.  To cause clients to connect to this router
without printing warning messages (and also prevent active
man-in-the-middle), the router's public key must printed out and inserted
into the client's authorized_keys file
rlSshServerHostPublicKeyTableEntry entry .1.3.6.1.4.1.89.78.2.1.1
The row definition for this table.
Indexes
rlSshServerHostPublicKeyAlgorithm rlSshServerHostPublicKeyFragmentId
Column Syntax OID
rlSshServerHostPublicKeyAlgorithm
Identifies the type of public key to be displayed.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.89.78.2.1.1.1
rlSshServerHostPublicKeyFragmentId
Identifies the index of this fragment in the final key. All segments must
be combined to form one big key.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.89.78.2.1.1.2
rlSshServerHostPublicKeyFragmentText
A part of the readable text entry for the server's public authorzation key.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.1.1.3
.1.3.6.1.4.1.89.78.2.2 · 1 row entry · 3 columns
This table contains the fingerprint for the router's public key.
The row definition for this table.
Indexes
rlSshServerHostPublicKeyFingerprintAlgorithm rlSshServerHostPublicKeyFingerprintDigestFormat
Column Syntax OID
rlSshServerHostPublicKeyFingerprintAlgorithm
Identifies the type of public key to be displayed.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.89.78.2.2.1.1
rlSshServerHostPublicKeyFingerprintDigestFormat
Format of the digest to be displayed (OpenSSH or SSH.com).
RlSshPublicKeyDigestFormat
Textual Convention: RlSshPublicKeyDigestFormat Enumeration
Type Values:
0hex
1bubbleBabble
.1.3.6.1.4.1.89.78.2.2.1.2
rlSshServerHostPublicKeyFingerprint
SECSH format fingerprint of the server's public key. To prevent man in
the middle attacks, users should make sure the ssh Server's fingerprint,
as printed in the connection process, is similar to the one printed here.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.2.1.3
.1.3.6.1.4.1.89.78.2.3 · 1 row entry · 4 columns
This table contains public keys for all users who are authorized to access
the router.  For a user to be able to log in using SSH, the user name must
appear in this table, and the user's public key must match the one found
here.
The row definition for this table.
Indexes
rlSshServerAuthorizedUserName rlSshServerAuthorizedUserPublicKeyFragmentId
Column Syntax OID
rlSshServerAuthorizedUserName
Name of the user who owns this public key. Both the user name and the
key bytes must match before a user is authenticated using this key.
OctetStringr/w
Constraints:
range: 1-48
.1.3.6.1.4.1.89.78.2.3.1.1
rlSshServerAuthorizedUserPublicKeyFragmentId
Identifies the index of this fragment in the final key. All segments must
be combined to form one big key.
SNMPv2-SMIUnsigned32r/w
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.89.78.2.3.1.2
rlSshServerAuthorizedUserPublicKeyFragmentText
A part of the readable text entry for the user's public authorzation key.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.3.1.3
rlSshServerAuthorizedUserPublicKeyFragmentStatus
Create or delete a fragment of the user's public key.
A user is deleted if it has no remaining fragments.
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.4.1.89.78.2.3.1.4
.1.3.6.1.4.1.89.78.2.5 · 1 row entry · 4 columns
This table contains the fingerprints of the public keys for all users who
are authorized to access the router.
To prevent man in the middle attacks, users should make sure the
user's fingerprint, as printed in the connection process, is similar
to the one printed here.
The row definition for this table.
Indexes
rlSshServerAuthorizedUserFingerprintName rlSshServerAuthorizedUserPublicKeyFingerprintDigestFormat
Column Syntax OID
rlSshServerAuthorizedUserFingerprintName
Name of the user who owns this public key. Both the user name and the
key bytes must match before a user is authenticated using this key.
OctetStringr/w
Constraints:
range: 1-48
.1.3.6.1.4.1.89.78.2.5.1.1
rlSshServerAuthorizedUserPublicKeyFingerprintAlgorithm
Identifies the type of public key to be displayed.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.89.78.2.5.1.2
rlSshServerAuthorizedUserPublicKeyFingerprintDigestFormat
Format of the digest to be displayed (OpenSSH or SSH.com).
RlSshPublicKeyDigestFormat
Textual Convention: RlSshPublicKeyDigestFormat Enumeration
Type Values:
0hex
1bubbleBabble
.1.3.6.1.4.1.89.78.2.5.1.3
rlSshServerAuthorizedUserPublicKeyFingerprint
SECSH format fingerprint of the user's public key. To prevent man in
the middle attacks, users should make sure their ssh fingerprint,
as printed in the connection process, is similar to the one printed here.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.5.1.4
.1.3.6.1.4.1.89.78.2.6 · 1 row entry · 7 columns
Each row in this table corresponds to an active SSH session with
the server
rlSshServerSessionTableEntry entry .1.3.6.1.4.1.89.78.2.6.1
The row definition for this table.
Indexes
rlSshServerSessionIdentifier
Column Syntax OID
rlSshServerSessionIdentifier
Identifies the connection to which this row corresponds.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.89.78.2.6.1.1
rlSshServerSessionPeerAddress
The network address of the remote host connected to the server.
SNMPv2-SMIIpAddress
Textual Convention: SNMPv2-SMIIpAddress OctetString
Type Constraints:
range: 4
.1.3.6.1.4.1.89.78.2.6.1.2
rlSshServerSessionPeerPort
The source network port of the remote host connected to the server.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.89.78.2.6.1.3
rlSshServerSessionPeerVersion
The client version of the remote host connected to the server.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.6.1.4
rlSshServerSessionUsername
SSH authenticated name of user connected to the server.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.6.1.5
rlSshServerSessionCipher
Data encryption cipher used in this connection.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.6.1.6
rlSshServerSessionHMAC
Message authentication code used in this connection.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.6.1.7
.1.3.6.1.4.1.89.78.2.7 · 1 row entry · 8 columns
Each row in this table corresponds to an active SSH session with the server
rlSshServerSessionInetTableEntry entry .1.3.6.1.4.1.89.78.2.7.1
The row definition for this table.
Indexes
rlSshServerSessionInetIdentifier
Column Syntax OID
rlSshServerSessionInetIdentifier
Identifies the connection to which this row corresponds.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.89.78.2.7.1.1
rlSshServerSessionInetPeerAddressType
The network address of the remote host connected to the server.
INET-ADDRESS-MIBInetAddressType
Textual Convention: INET-ADDRESS-MIBInetAddressType Enumeration
Type Values:
0unknown
1ipv4
2ipv6
3ipv4z
4ipv6z
16dns
25l2vpn
.1.3.6.1.4.1.89.78.2.7.1.2
rlSshServerSessionInetPeerAddress
The network address of the remote host connected to the server.
INET-ADDRESS-MIBInetAddress
Textual Convention: INET-ADDRESS-MIBInetAddress OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.7.1.3
rlSshServerSessionInetPeerPort
The source network port of the remote host connected to the server.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.89.78.2.7.1.4
rlSshServerSessionInetPeerVersion
The client version of the remote host connected to the server.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.7.1.5
rlSshServerSessionInetUsername
SSH authenticated name of user connected to the server.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.7.1.6
rlSshServerSessionInetCipher
Data encryption cipher used in this connection.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.7.1.7
rlSshServerSessionInetHMAC
Message authentication code used in this connection.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.2.7.1.8
.1.3.6.1.4.1.89.78.2.8 · 1 row entry · 4 columns
This table can be used for 2 purposes:
1) Importing public/private key pair to serve as the device key when acting
as SSH server. This is done by setting entries to this table, according to
the specified format. When the last entry (footer) is set, the whole key
pair is checked and if valid, stored in CDB.
2) Exporting the device SSH server public/private key. This can be done by
performing GetNext operations on this table.
rlSshServerImportExportSelfKeyEntry entry .1.3.6.1.4.1.89.78.2.8.1
The row definition for this table.
Indexes
rlSshServerImportExportSelfKeyAlgorithm rlSshServerImportExportSelfKeyFormat rlSshServerImportExportSelfKeyFragmentId
Column Syntax OID
rlSshServerImportExportSelfKeyAlgorithm
Identifies the type of key pair.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.89.78.2.8.1.1
rlSshServerImportExportSelfKeyFormat
Specifies the format of public/key pair. The following formats are
supported for import/export:
1) uuencoded_format - in this format both private and public key are in
uu-encoded format, and are seperated from one anoth…
Enumeration
Enumerated Values:
1uuencoded-format
.1.3.6.1.4.1.89.78.2.8.1.2
rlSshServerImportExportSelfKeyFragmentId
Identifies the index of this fragment in the key pair input/output.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.1.3.6.1.4.1.89.78.2.8.1.3
rlSshServerImportExportSelfKeyFragmentText
A part of the readable text entry for the key pair input/output.
OctetStringr/w .1.3.6.1.4.1.89.78.2.8.1.4
.1.3.6.1.4.1.89.78.3.3 · 1 row entry · 3 columns
This table contains the router's client self public key.  Each row in
this table contains a fragment of the key, in printable binhex format.
There may be up to 160 characters in every fragment, and they are all
combined to form one key.  The key is generated by writing to
rlSshClientRegenerateSelfKey.  To cause clients to connect to this router
without printing warning messages (and also prevent active
man-in-the-middle), the router's public key must printed out and
inserted into the client's authorized_keys file
rlSshClientSelfPublicKeyTableEntry entry .1.3.6.1.4.1.89.78.3.3.1
The row definition for this table.
Indexes
rlSshClientSelfPublicKeyAlgorithm rlSshClientSelfPublicKeyFragmentId
Column Syntax OID
rlSshClientSelfPublicKeyFragmentId
Identifies the index of this fragment in the final key. All segments must
be combined to form one big key.
SNMPv2-SMIUnsigned32
Textual Convention: SNMPv2-SMIUnsigned32 Unsigned32
Type Constraints:
range: 0..4294967295
.1.3.6.1.4.1.89.78.3.3.1.1
rlSshClientSelfPublicKeyAlgorithm
Identifies the type of public key to be displayed.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.89.78.3.3.1.2
rlSshClientSelfPublicKeyFragmentText
A part of the readable text entry for the router's client public
authorization key.
SNMPv2-TCDisplayStringr/w
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.3.3.1.3
.1.3.6.1.4.1.89.78.3.4 · 1 row entry · 3 columns
This table contains the fingerprint for the client's self key.
The row definition for this table.
Indexes
rlSshClientSelfPublicKeyFingerprintAlgorithm rlSshClientSelfPublicKeyFingerprintDigestFormat
Column Syntax OID
rlSshClientSelfPublicKeyFingerprintAlgorithm
Identifies the type of public key to be displayed.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.89.78.3.4.1.1
rlSshClientSelfPublicKeyFingerprintDigestFormat
Format of the digest to be displayed (OpenSSH or SSH.com).
RlSshPublicKeyDigestFormat
Textual Convention: RlSshPublicKeyDigestFormat Enumeration
Type Values:
0hex
1bubbleBabble
.1.3.6.1.4.1.89.78.3.4.1.2
rlSshClientSelfPublicKeyFingerprint
SECSH format fingerprint of the client's self key. To prevent man in
the middle attacks, users should make sure the ssh Server's fingerprint,
as printed in the connection process, is similar to the one printed here.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.3.4.1.3
.1.3.6.1.4.1.89.78.3.7 · 1 row entry · 7 columns
This table allows the user to change the password in a remote SSH server.
It should be used when working with 'password' authentication with remote
server in SCP sessions.
Set operation on this table will initiate SCP session with the SSH server
whose inet address is specified in the key rlSshClientPasswordChangeInetAddress.
During this session the password for username rlSshClientPasswordChangeUsername
will be changed in the server from rlSshClientPasswordChangeOldPassword to
rlSshClientPasswordChangeNewPassword.
The Set operation might fail, in case an SCP session is already being
held. In case 'noError' is returned, the user can poll the fields
rlSshClientPasswordChangeStatus and rlSshClientPasswordChangeFailureReason
in order to get information on operation status and possible failure
reason. Note: up to 3 status records can be saved.
rlSshClientPasswordChangeEntry entry .1.3.6.1.4.1.89.78.3.7.1
The row definition for this table.
Indexes
rlSshClientPasswordChangeInetAddrType rlSshClientPasswordChangeInetAddr
Column Syntax OID
rlSshClientPasswordChangeInetAddrType
Specifies the inet address type of remote SCP server
INET-ADDRESS-MIBInetAddressType
Textual Convention: INET-ADDRESS-MIBInetAddressType Enumeration
Type Values:
0unknown
1ipv4
2ipv6
3ipv4z
4ipv6z
16dns
25l2vpn
.1.3.6.1.4.1.89.78.3.7.1.1
rlSshClientPasswordChangeInetAddr
Specifies the inet address of remote SCP server
INET-ADDRESS-MIBInetAddress
Textual Convention: INET-ADDRESS-MIBInetAddress OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.3.7.1.2
rlSshClientPasswordChangeUsername
Specifies the username for which the password change is required.
OctetStringr/w
Constraints:
range: 1-70
.1.3.6.1.4.1.89.78.3.7.1.3
rlSshClientPasswordChangeOldPassword
Specifies the old password that was in use for rlSshClientPasswordChangeUsername
until now. Upon setting a value in this entry, length of this field value
must be 6-70. Password of length 0 will always be returned on GE…
OctetStringr/w
Constraints:
range: 0-70
.1.3.6.1.4.1.89.78.3.7.1.4
rlSshClientPasswordChangeNewPassword
Specifies the new password that should be in use for
rlSshClientPasswordChangeUsername from now on. Upon setting a value in this
entry, length of this field value must be 6-70.
Password of length 0 will always be return…
OctetStringr/w
Constraints:
range: 0-70
.1.3.6.1.4.1.89.78.3.7.1.5
rlSshClientPasswordChangeStatus
Specifies the status of last password change operation on remote server
identified by rlSshClientPasswordChangeInetAddress. In case this data was
erased (3 or more password change operations have been performed since
th…
Enumeration
Enumerated Values:
1inProgress
2succeeded
3failed
4noData
.1.3.6.1.4.1.89.78.3.7.1.6
rlSshClientPasswordChangeFailureReason
In case the value of rlSshClientPasswordChangeStatus is 'failed', this
field will contain the failure reason.
SNMPv2-TCDisplayString
Textual Convention: SNMPv2-TCDisplayString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.3.7.1.7
.1.3.6.1.4.1.89.78.3.9 · 1 row entry · 4 columns
This table can be used for 2 purposes:
1) Importing public/private key pair to serve as the device key when acting
as SSH client. This is done by setting entries to this table, according to
the specified format. When the last entry (footer) is set, the whole key
pair is checked and if valid, stored in CDB.
2) Exporting the device SSH client public/private key. This can be done by
performing GetNext operations on this table.
rlSshClientImportExportSelfKeyEntry entry .1.3.6.1.4.1.89.78.3.9.1
The row definition for this table.
Indexes
rlSshClientImportExportSelfKeyAlgorithm rlSshClientImportExportSelfKeyFormat rlSshClientImportExportSelfKeyFragmentId
Column Syntax OID
rlSshClientImportExportSelfKeyAlgorithm
Identifies the type of key pair.
RlSshPublicKeyAlgorithm
Textual Convention: RlSshPublicKeyAlgorithm Enumeration
Type Values:
0rsa1
1rsa
2dsa
999none
.1.3.6.1.4.1.89.78.3.9.1.1
rlSshClientImportExportSelfKeyFormat
Specifies the format of public/key pair. The following formats are
supported for import/export:
1) uuencoded_format - in this format both private and public key are in
uu-encoded format, and are seperated from one anoth…
Enumeration
Enumerated Values:
1uuencoded-format
.1.3.6.1.4.1.89.78.3.9.1.2
rlSshClientImportExportSelfKeyFragmentId
Identifies the index of this fragment in the key pair input/output.
Integer32
Textual Convention: COPS-PR-SPPIInteger32 Integer32
Type Constraints:
range: -2147483648..2147483647
.1.3.6.1.4.1.89.78.3.9.1.3
rlSshClientImportExportSelfKeyFragmentText
A part of the readable text entry for the key pair input/output.
OctetStringr/w .1.3.6.1.4.1.89.78.3.9.1.4
.1.3.6.1.4.1.89.78.3.10 · 1 row entry · 4 columns
Table for storing fingerprints of remote servers public keys. It is used for
the purpose of server authentication. An entry can be inserted to this table
either explicitly by user configuration, or during copy operation, after
user's approval.
The row definition for this table.
Indexes
rlSshClientRemoteServerFingerprintInetAddrType rlSshClientRemoteServerFingerprintInetAddr rlSshClientRemoteServerFingerprint
Column Syntax OID
rlSshClientRemoteServerFingerprintInetAddrType
Remote server inet address type.
INET-ADDRESS-MIBInetAddressType
Textual Convention: INET-ADDRESS-MIBInetAddressType Enumeration
Type Values:
0unknown
1ipv4
2ipv6
3ipv4z
4ipv6z
16dns
25l2vpn
.1.3.6.1.4.1.89.78.3.10.1.1
rlSshClientRemoteServerFingerprintInetAddr
Remote server inet address.
INET-ADDRESS-MIBInetAddress
Textual Convention: INET-ADDRESS-MIBInetAddress OctetString
Type Constraints:
range: 0..255
.1.3.6.1.4.1.89.78.3.10.1.2
rlSshClientRemoteServerFingerprint
Remote server fingerprint.
OctetStringr/w
Constraints:
range: 16-16
.1.3.6.1.4.1.89.78.3.10.1.3
rlSshClientRemoteServerFingerprintStatus
Row status for this row.
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.4.1.89.78.3.10.1.4