SNMP-TLS-TM-MIB Table View

Table-centric layout grouping table, row, and column objects.

Tables
3
Rows
3
Columns
13
.1.3.6.1.2.1.198.2.2.1.3 · 1 row entry · 6 columns
This table is used by a (D)TLS server to map the (D)TLS
client's presented X.509 certificate to a tmSecurityName.
          
On an incoming (D)TLS/SNMP connection, the client's presented
certificate must either be validated based on an established
trust anchor, or it must directly match a fingerprint in this
table.  This table does not provide any mechanisms for
configuring the trust anchors; the transfer of any needed
trusted certificates for path validation is expected to occur
through an out-of-band transfer.
          
Once the certificate has been found acceptable (either by path
validation or directly matching a fingerprint in this table),
this table is consulted to determine the appropriate
tmSecurityName to identify with the remote connection.  This
is done by considering each active row from this table in
prioritized order according to its snmpTlstmCertToTSNID value.
Each row's snmpTlstmCertToTSNFingerprint value determines
whether the row is a match for the incoming connection:
          
    1) If the row's snmpTlstmCertToTSNFingerprint value
       identifies the presented certificate, then consider the
       row as a successful match.
          
    2) If the row's snmpTlstmCertToTSNFingerprint value
       identifies a locally held copy of a trusted CA
       certificate and that CA certificate was used to
       validate the path to the presented certificate, then
       consider the row as a successful match.
          
Once a matching row has been found, the
snmpTlstmCertToTSNMapType value can be used to determine how
the tmSecurityName to associate with the session should be
determined.  See the snmpTlstmCertToTSNMapType column's
DESCRIPTION for details on determining the tmSecurityName
value.  If it is impossible to determine a tmSecurityName from
the row's data combined with the data presented in the
          
certificate, then additional rows MUST be searched looking for
another potential match.  If a resulting tmSecurityName mapped
from a given row is not compatible with the needed
requirements of a tmSecurityName (e.g., VACM imposes a
32-octet-maximum length and the certificate derived
securityName could be longer), then it must be considered an
invalid match and additional rows MUST be searched looking for
another potential match.
          
If no matching and valid row can be found, the connection MUST
be closed and SNMP messages MUST NOT be accepted over it.
          
Missing values of snmpTlstmCertToTSNID are acceptable and
implementations should continue to the next highest numbered
row.  It is recommended that administrators skip index values
to leave room for the insertion of future rows (for example,
use values of 10 and 20 when creating initial rows).
          
Users are encouraged to make use of certificates with
subjectAltName fields that can be used as tmSecurityNames so
that a single root CA certificate can allow all child
certificate's subjectAltName to map directly to a
tmSecurityName via a 1:1 transformation.  However, this table
is flexible to allow for situations where existing deployed
certificate infrastructures do not provide adequate
subjectAltName values for use as tmSecurityNames.
Certificates may also be mapped to tmSecurityNames using the
CommonName portion of the Subject field.  However, the usage
of the CommonName field is deprecated and thus this usage is
NOT RECOMMENDED.  Direct mapping from each individual
certificate fingerprint to a tmSecurityName is also possible
but requires one entry in the table per tmSecurityName and
requires more management operations to completely configure a
device.
snmpTlstmCertToTSNEntry entry .1.3.6.1.2.1.198.2.2.1.3.1
A row in the snmpTlstmCertToTSNTable that specifies a mapping
for an incoming (D)TLS certificate to a tmSecurityName to use
for a connection.
Indexes
snmpTlstmCertToTSNID
Column Syntax OID
snmpTlstmCertToTSNID
A unique, prioritized index for the given entry. Lower
numbers indicate a higher priority.
Unsigned32
Constraints:
range: 1-4294967295
.1.3.6.1.2.1.198.2.2.1.3.1.1
snmpTlstmCertToTSNFingerprint
A cryptographic hash of an X.509 certificate. The results of
a successful matching fingerprint to either the trusted CA in
the certificate validation path or to the certificate itself
is dictated by the snmpTlstmCertTo…
OctetStringr/w
Constraints:
range: 1-255
.1.3.6.1.2.1.198.2.2.1.3.1.2
snmpTlstmCertToTSNMapType
Specifies the mapping type for deriving a tmSecurityName from
a certificate. Details for mapping of a particular type SHALL
be specified in the DESCRIPTION clause of the OBJECT-IDENTITY
that describes the mapping. If …
SNMPv2-TCAutonomousTyper/w
Textual Convention: SNMPv2-TCAutonomousType ObjectIdentifier
.1.3.6.1.2.1.198.2.2.1.3.1.3
snmpTlstmCertToTSNData
Auxiliary data used as optional configuration information for
a given mapping specified by the snmpTlstmCertToTSNMapType
column. Only some mapping systems will make use of this
column. The value in this column MUST be…
OctetStringr/w
Constraints:
range: 0-1024
.1.3.6.1.2.1.198.2.2.1.3.1.4
snmpTlstmCertToTSNStorageType
The storage type for this conceptual row. Conceptual rows
having the value 'permanent' need not allow write-access to
any columnar objects in the row.
SNMPv2-TCStorageTyper/w
Textual Convention: SNMPv2-TCStorageType Enumeration
Type Values:
1other
2volatile
3nonVolatile
4permanent
5readOnly
.1.3.6.1.2.1.198.2.2.1.3.1.5
snmpTlstmCertToTSNRowStatus
The status of this conceptual row. This object may be used
to create or remove rows from this table.

To create a row in this table, an administrator must set this
object to either createAndGo(4) or creat…
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.2.1.198.2.2.1.3.1.6
.1.3.6.1.2.1.198.2.2.1.6 · 1 row entry · 3 columns
This table is used by a (D)TLS client when a (D)TLS
connection is being set up using an entry in the
SNMP-TARGET-MIB.  It extends the SNMP-TARGET-MIB's
snmpTargetParamsTable with a fingerprint of a certificate to
use when establishing such a (D)TLS connection.
snmpTlstmParamsEntry entry .1.3.6.1.2.1.198.2.2.1.6.1
A conceptual row containing a fingerprint hash of a locally
held certificate for a given snmpTargetParamsEntry. The
values in this row should be ignored if the connection that
needs to be established, as indicated by t…
Indexes
SNMP-TARGET-MIBsnmpTargetParamsName
Column Syntax OID
snmpTlstmParamsClientFingerprint
This object stores the hash of the public portion of a
locally held X.509 certificate. The X.509 certificate, its
public key, and the corresponding private key will be used
when initiating a (D)TLS connection as a (D)T…
SnmpTLSFingerprintr/w
Textual Convention: SnmpTLSFingerprint OctetString
Type Constraints:
range: 0..255
.1.3.6.1.2.1.198.2.2.1.6.1.1
snmpTlstmParamsStorageType
The storage type for this conceptual row. Conceptual rows
having the value 'permanent' need not allow write-access to
any columnar objects in the row.
SNMPv2-TCStorageTyper/w
Textual Convention: SNMPv2-TCStorageType Enumeration
Type Values:
1other
2volatile
3nonVolatile
4permanent
5readOnly
.1.3.6.1.2.1.198.2.2.1.6.1.2
snmpTlstmParamsRowStatus
The status of this conceptual row. This object may be used
to create or remove rows from this table.

To create a row in this table, an administrator must set this
object to either createAndGo(4) or creat…
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.2.1.198.2.2.1.6.1.3
.1.3.6.1.2.1.198.2.2.1.9 · 1 row entry · 4 columns
This table is used by a (D)TLS client when a (D)TLS
connection is being set up using an entry in the
SNMP-TARGET-MIB.  It extends the SNMP-TARGET-MIB's
          
snmpTargetAddrTable so that the client can verify that the
correct server has been reached.  This verification can use
either a certificate fingerprint, or an identity
authenticated via certification path validation.
          
If there is an active row in this table corresponding to the
entry in the SNMP-TARGET-MIB that was used to establish the
connection, and the row's snmpTlstmAddrServerFingerprint
column has non-empty value, then the server's presented
certificate is compared with the
snmpTlstmAddrServerFingerprint value (and the
snmpTlstmAddrServerIdentity column is ignored).  If the
fingerprint matches, the verification has succeeded.  If the
fingerprint does not match, then the connection MUST be
closed.
          
If the server's presented certificate has passed
certification path validation [RFC5280] to a configured
trust anchor, and an active row exists with a zero-length
snmpTlstmAddrServerFingerprint value, then the
snmpTlstmAddrServerIdentity column contains the expected
host name.  This expected host name is then compared against
the server's certificate as follows:
          
  - Implementations MUST support matching the expected host
  name against a dNSName in the subjectAltName extension
  field and MAY support checking the name against the
  CommonName portion of the subject distinguished name.
          
  - The '*' (ASCII 0x2a) wildcard character is allowed in the
  dNSName of the subjectAltName extension (and in common
  name, if used to store the host name), but only as the
  left-most (least significant) DNS label in that value.
  This wildcard matches any left-most DNS label in the
  server name.  That is, the subject *.example.com matches
  the server names a.example.com and b.example.com, but does
  not match example.com or a.b.example.com.  Implementations
  MUST support wildcards in certificates as specified above,
  but MAY provide a configuration option to disable them.
          
  - If the locally configured name is an internationalized
  domain name, conforming implementations MUST convert it to
  the ASCII Compatible Encoding (ACE) format for performing
  comparisons, as specified in Section 7 of [RFC5280].
          
If the expected host name fails these conditions then the
connection MUST be closed.
          
If there is no row in this table corresponding to the entry
in the SNMP-TARGET-MIB and the server can be authorized by
another, implementation-dependent means, then the connection
MAY still proceed.
snmpTlstmAddrEntry entry .1.3.6.1.2.1.198.2.2.1.9.1
A conceptual row containing a copy of a certificate's
fingerprint for a given snmpTargetAddrEntry. The values in
this row should be ignored if the connection that needs to be
established, as indicated by the SNMP-TARGE…
Indexes
SNMP-TARGET-MIBsnmpTargetAddrName
Column Syntax OID
snmpTlstmAddrServerFingerprint
A cryptographic hash of a public X.509 certificate. This
object should store the hash of the public X.509 certificate
that the remote server should present during the (D)TLS
connection setup. The fingerprint of the pr…
SnmpTLSFingerprintr/w
Textual Convention: SnmpTLSFingerprint OctetString
Type Constraints:
range: 0..255
.1.3.6.1.2.1.198.2.2.1.9.1.1
snmpTlstmAddrServerIdentity
The reference identity to check against the identity
presented by the remote system.
SNMP-FRAMEWORK-MIBSnmpAdminStringr/w
Textual Convention: SNMP-FRAMEWORK-MIBSnmpAdminString OctetString
Type Constraints:
range: 0..255
.1.3.6.1.2.1.198.2.2.1.9.1.2
snmpTlstmAddrStorageType
The storage type for this conceptual row. Conceptual rows
having the value 'permanent' need not allow write-access to
any columnar objects in the row.
SNMPv2-TCStorageTyper/w
Textual Convention: SNMPv2-TCStorageType Enumeration
Type Values:
1other
2volatile
3nonVolatile
4permanent
5readOnly
.1.3.6.1.2.1.198.2.2.1.9.1.3
snmpTlstmAddrRowStatus
The status of this conceptual row. This object may be used
to create or remove rows from this table.

To create a row in this table, an administrator must set this
object to either createAndGo(4) or creat…
SNMPv2-TCRowStatusr/w
Textual Convention: SNMPv2-TCRowStatus Enumeration
Type Values:
1active
2notInService
3notReady
4createAndGo
5createAndWait
6destroy
.1.3.6.1.2.1.198.2.2.1.9.1.4