SNMP-TLS-TM-MIB Table View
Table-centric layout grouping table, row, and column objects.
Tables
3
Rows
3
Columns
13
snmpTlstmCertToTSNTable
table.1.3.6.1.2.1.198.2.2.1.3
·
1 row entry
·
6 columns
This table is used by a (D)TLS server to map the (D)TLS
client's presented X.509 certificate to a tmSecurityName.
On an incoming (D)TLS/SNMP connection, the client's presented
certificate must either be validated based on an established
trust anchor, or it must directly match a fingerprint in this
table. This table does not provide any mechanisms for
configuring the trust anchors; the transfer of any needed
trusted certificates for path validation is expected to occur
through an out-of-band transfer.
Once the certificate has been found acceptable (either by path
validation or directly matching a fingerprint in this table),
this table is consulted to determine the appropriate
tmSecurityName to identify with the remote connection. This
is done by considering each active row from this table in
prioritized order according to its snmpTlstmCertToTSNID value.
Each row's snmpTlstmCertToTSNFingerprint value determines
whether the row is a match for the incoming connection:
1) If the row's snmpTlstmCertToTSNFingerprint value
identifies the presented certificate, then consider the
row as a successful match.
2) If the row's snmpTlstmCertToTSNFingerprint value
identifies a locally held copy of a trusted CA
certificate and that CA certificate was used to
validate the path to the presented certificate, then
consider the row as a successful match.
Once a matching row has been found, the
snmpTlstmCertToTSNMapType value can be used to determine how
the tmSecurityName to associate with the session should be
determined. See the snmpTlstmCertToTSNMapType column's
DESCRIPTION for details on determining the tmSecurityName
value. If it is impossible to determine a tmSecurityName from
the row's data combined with the data presented in the
certificate, then additional rows MUST be searched looking for
another potential match. If a resulting tmSecurityName mapped
from a given row is not compatible with the needed
requirements of a tmSecurityName (e.g., VACM imposes a
32-octet-maximum length and the certificate derived
securityName could be longer), then it must be considered an
invalid match and additional rows MUST be searched looking for
another potential match.
If no matching and valid row can be found, the connection MUST
be closed and SNMP messages MUST NOT be accepted over it.
Missing values of snmpTlstmCertToTSNID are acceptable and
implementations should continue to the next highest numbered
row. It is recommended that administrators skip index values
to leave room for the insertion of future rows (for example,
use values of 10 and 20 when creating initial rows).
Users are encouraged to make use of certificates with
subjectAltName fields that can be used as tmSecurityNames so
that a single root CA certificate can allow all child
certificate's subjectAltName to map directly to a
tmSecurityName via a 1:1 transformation. However, this table
is flexible to allow for situations where existing deployed
certificate infrastructures do not provide adequate
subjectAltName values for use as tmSecurityNames.
Certificates may also be mapped to tmSecurityNames using the
CommonName portion of the Subject field. However, the usage
of the CommonName field is deprecated and thus this usage is
NOT RECOMMENDED. Direct mapping from each individual
certificate fingerprint to a tmSecurityName is also possible
but requires one entry in the table per tmSecurityName and
requires more management operations to completely configure a
device.
A row in the snmpTlstmCertToTSNTable that specifies a mapping
for an incoming (D)TLS certificate to a tmSecurityName to use
for a connection.
for an incoming (D)TLS certificate to a tmSecurityName to use
for a connection.
Indexes
snmpTlstmCertToTSNID
| Column | Syntax | OID | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
snmpTlstmCertToTSNID
A unique, prioritized index for the given entry. Lower
numbers indicate a higher priority. |
Unsigned32 Constraints: range: 1-4294967295 |
.1.3.6.1.2.1.198.2.2.1.3.1.1 |
||||||||||||
|
snmpTlstmCertToTSNFingerprint
A cryptographic hash of an X.509 certificate. The results of
a successful matching fingerprint to either the trusted CA in the certificate validation path or to the certificate itself is dictated by the snmpTlstmCertTo… |
OctetStringr/w Constraints: range: 1-255 |
.1.3.6.1.2.1.198.2.2.1.3.1.2 |
||||||||||||
|
snmpTlstmCertToTSNMapType
Specifies the mapping type for deriving a tmSecurityName from
a certificate. Details for mapping of a particular type SHALL be specified in the DESCRIPTION clause of the OBJECT-IDENTITY that describes the mapping. If … |
SNMPv2-TCAutonomousTyper/w Textual Convention: SNMPv2-TCAutonomousType ObjectIdentifier |
.1.3.6.1.2.1.198.2.2.1.3.1.3 |
||||||||||||
|
snmpTlstmCertToTSNData
Auxiliary data used as optional configuration information for
a given mapping specified by the snmpTlstmCertToTSNMapType column. Only some mapping systems will make use of this column. The value in this column MUST be… |
OctetStringr/w Constraints: range: 0-1024 |
.1.3.6.1.2.1.198.2.2.1.3.1.4 |
||||||||||||
|
snmpTlstmCertToTSNStorageType
The storage type for this conceptual row. Conceptual rows
having the value 'permanent' need not allow write-access to any columnar objects in the row. |
SNMPv2-TCStorageTyper/w Textual Convention: SNMPv2-TCStorageType EnumerationType Values:
|
.1.3.6.1.2.1.198.2.2.1.3.1.5 |
||||||||||||
|
snmpTlstmCertToTSNRowStatus
The status of this conceptual row. This object may be used
to create or remove rows from this table. To create a row in this table, an administrator must set this object to either createAndGo(4) or creat… |
SNMPv2-TCRowStatusr/w Textual Convention: SNMPv2-TCRowStatus EnumerationType Values:
|
.1.3.6.1.2.1.198.2.2.1.3.1.6 |
snmpTlstmParamsTable
table.1.3.6.1.2.1.198.2.2.1.6
·
1 row entry
·
3 columns
This table is used by a (D)TLS client when a (D)TLS connection is being set up using an entry in the SNMP-TARGET-MIB. It extends the SNMP-TARGET-MIB's snmpTargetParamsTable with a fingerprint of a certificate to use when establishing such a (D)TLS connection.
A conceptual row containing a fingerprint hash of a locally
held certificate for a given snmpTargetParamsEntry. The
values in this row should be ignored if the connection that
needs to be established, as indicated by t…
held certificate for a given snmpTargetParamsEntry. The
values in this row should be ignored if the connection that
needs to be established, as indicated by t…
Indexes
SNMP-TARGET-MIBsnmpTargetParamsName
| Column | Syntax | OID | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
snmpTlstmParamsClientFingerprint
This object stores the hash of the public portion of a
locally held X.509 certificate. The X.509 certificate, its public key, and the corresponding private key will be used when initiating a (D)TLS connection as a (D)T… |
SnmpTLSFingerprintr/w Textual Convention: SnmpTLSFingerprint OctetStringType Constraints: range: 0..255 |
.1.3.6.1.2.1.198.2.2.1.6.1.1 |
||||||||||||
|
snmpTlstmParamsStorageType
The storage type for this conceptual row. Conceptual rows
having the value 'permanent' need not allow write-access to any columnar objects in the row. |
SNMPv2-TCStorageTyper/w Textual Convention: SNMPv2-TCStorageType EnumerationType Values:
|
.1.3.6.1.2.1.198.2.2.1.6.1.2 |
||||||||||||
|
snmpTlstmParamsRowStatus
The status of this conceptual row. This object may be used
to create or remove rows from this table. To create a row in this table, an administrator must set this object to either createAndGo(4) or creat… |
SNMPv2-TCRowStatusr/w Textual Convention: SNMPv2-TCRowStatus EnumerationType Values:
|
.1.3.6.1.2.1.198.2.2.1.6.1.3 |
snmpTlstmAddrTable
table.1.3.6.1.2.1.198.2.2.1.9
·
1 row entry
·
4 columns
This table is used by a (D)TLS client when a (D)TLS
connection is being set up using an entry in the
SNMP-TARGET-MIB. It extends the SNMP-TARGET-MIB's
snmpTargetAddrTable so that the client can verify that the
correct server has been reached. This verification can use
either a certificate fingerprint, or an identity
authenticated via certification path validation.
If there is an active row in this table corresponding to the
entry in the SNMP-TARGET-MIB that was used to establish the
connection, and the row's snmpTlstmAddrServerFingerprint
column has non-empty value, then the server's presented
certificate is compared with the
snmpTlstmAddrServerFingerprint value (and the
snmpTlstmAddrServerIdentity column is ignored). If the
fingerprint matches, the verification has succeeded. If the
fingerprint does not match, then the connection MUST be
closed.
If the server's presented certificate has passed
certification path validation [RFC5280] to a configured
trust anchor, and an active row exists with a zero-length
snmpTlstmAddrServerFingerprint value, then the
snmpTlstmAddrServerIdentity column contains the expected
host name. This expected host name is then compared against
the server's certificate as follows:
- Implementations MUST support matching the expected host
name against a dNSName in the subjectAltName extension
field and MAY support checking the name against the
CommonName portion of the subject distinguished name.
- The '*' (ASCII 0x2a) wildcard character is allowed in the
dNSName of the subjectAltName extension (and in common
name, if used to store the host name), but only as the
left-most (least significant) DNS label in that value.
This wildcard matches any left-most DNS label in the
server name. That is, the subject *.example.com matches
the server names a.example.com and b.example.com, but does
not match example.com or a.b.example.com. Implementations
MUST support wildcards in certificates as specified above,
but MAY provide a configuration option to disable them.
- If the locally configured name is an internationalized
domain name, conforming implementations MUST convert it to
the ASCII Compatible Encoding (ACE) format for performing
comparisons, as specified in Section 7 of [RFC5280].
If the expected host name fails these conditions then the
connection MUST be closed.
If there is no row in this table corresponding to the entry
in the SNMP-TARGET-MIB and the server can be authorized by
another, implementation-dependent means, then the connection
MAY still proceed.
A conceptual row containing a copy of a certificate's
fingerprint for a given snmpTargetAddrEntry. The values in
this row should be ignored if the connection that needs to be
established, as indicated by the SNMP-TARGE…
fingerprint for a given snmpTargetAddrEntry. The values in
this row should be ignored if the connection that needs to be
established, as indicated by the SNMP-TARGE…
Indexes
SNMP-TARGET-MIBsnmpTargetAddrName
| Column | Syntax | OID | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
snmpTlstmAddrServerFingerprint
A cryptographic hash of a public X.509 certificate. This
object should store the hash of the public X.509 certificate that the remote server should present during the (D)TLS connection setup. The fingerprint of the pr… |
SnmpTLSFingerprintr/w Textual Convention: SnmpTLSFingerprint OctetStringType Constraints: range: 0..255 |
.1.3.6.1.2.1.198.2.2.1.9.1.1 |
||||||||||||
|
snmpTlstmAddrServerIdentity
The reference identity to check against the identity
presented by the remote system. |
SNMP-FRAMEWORK-MIBSnmpAdminStringr/w Textual Convention: SNMP-FRAMEWORK-MIBSnmpAdminString OctetStringType Constraints: range: 0..255 |
.1.3.6.1.2.1.198.2.2.1.9.1.2 |
||||||||||||
|
snmpTlstmAddrStorageType
The storage type for this conceptual row. Conceptual rows
having the value 'permanent' need not allow write-access to any columnar objects in the row. |
SNMPv2-TCStorageTyper/w Textual Convention: SNMPv2-TCStorageType EnumerationType Values:
|
.1.3.6.1.2.1.198.2.2.1.9.1.3 |
||||||||||||
|
snmpTlstmAddrRowStatus
The status of this conceptual row. This object may be used
to create or remove rows from this table. To create a row in this table, an administrator must set this object to either createAndGo(4) or creat… |
SNMPv2-TCRowStatusr/w Textual Convention: SNMPv2-TCRowStatus EnumerationType Values:
|
.1.3.6.1.2.1.198.2.2.1.9.1.4 |