rfc3276.Definitions of Managed Objects for High Bit-Rate DSL - 2nd generation (HDSL2) and Single-Pai
apshceduler jobstore参数用法
apshceduler jobstore参数用法在apscheduler中,jobstore是一个参数,用于指定任务调度器如何存储、管理任务。
通过不同的jobstore参数设置,我们可以灵活地控制任务的存储方式和运行规则。
下面是几种常见的jobstore参数用法:1. "default":默认的jobstore参数值为"default",它使用内存来存储任务。
这意味着所有的任务都将在内存中进行管理,而不会被持久化保存。
当应用程序重新启动时,所有的任务将被重置,并且需要重新添加。
默认的jobstore参数适用于快速原型开发和测试环境。
2. "sqlalchemy":将jobstore参数设置为"sqlalchemy"时,apscheduler将使用SQLAlchemy库提供的数据库服务来存储任务。
通过配置数据库连接信息,我们可以将任务持久化保存在数据库中,以便在应用程序重启后能够继续运行先前定义的任务。
这种方式适用于生产环境,可以保证任务的持久性和可靠性。
3. "mongodb":使用"mongodb"作为jobstore参数值时,apscheduler将利用MongoDB数据库来存储任务。
类似于使用SQLAlchemy的方式,这种设置可以保证任务的持久性,并且在应用程序重启后可以恢复之前定义的任务。
对于需要高可用和可扩展性的场景,使用MongoDB作为任务存储方式是一个不错的选择。
4. "redis":当jobstore参数设置为"redis"时,apscheduler将使用Redis数据库来存储任务。
Redis是一个高性能的内存数据库,它的持久化机制可以保证任务的可靠性。
与使用SQLAlchemy或MongoDB不同,Redis将任务存储在内存中,可以实现更快的读写速度。
网络拓扑论述(snmp版本)
网络拓扑发现snmp摘要随着计算机网络技术的发展和lnternet在全世界范围内的普及,计算机网络作为信息社会的基础设施已应用到政府部门、商业、军事、教育等社会各领域。
当前计算机网络的发展特点是:网络规模不断扩大,复杂性不断增加,网络的异构性也越来越高。
在现有的技术条件下,人们希望有一个更加稳定可靠的网络环境,计算机网络管理系统就是应这样的需求而产生的。
它对网络上的各种设备进行管理,通过监视和控制这些设备,及时地向管理人员报告网络状态,并且简化网络故障的处理,减少故障造成的损失,提高网络的服务质量和效率[1]。
一个好的网络管理系统首先需要掌握整个被管网络的拓扑结构。
网络的配置管理是发现和配置网络中对网络管理有意义的设备的过程,而网络的自动拓扑发现规则是配置管理的核心,是故障和性能管理的基础,同时它也是衡量一个商业网管系统成败的重要尺度。
因此,拓扑发现算法的设计在整个网管系统的开发中有着举足轻重的地位。
网络拓扑发现技术是利用网管协议或网络提供的可用工具,通过拓扑算法,发现网络中路由器、交换机及主机之间的连接关系,并且以图形的方式直观地显示出来,同时还要尽量减小发现网络设备和显示设备拓扑图的运行代价[2]。
为了发现更加详细的网络拓扑结构,网络的多层自动拓扑发现是必不可少的,业界通常把网络自动拓扑发现分为两部分,即IP管理域内网络层拓扑发现和数据链路层拓扑发现,本文将详细地介绍网络拓扑自动发现算法。
1.拓扑发现算法的相关协议简介1.1 SNMP(Simple Network ManagementProtocol,简单网络管理协议)由于SNMP的简单和易于实现的特点,该管理协议已经成为目前应用最为广泛和最为流行的网络管理协议,也成为了事实上的标准[3]。
它的设计目的是使网络管理站能够有效而简单地监视和控制网络设备,它由管理者、管理信息库(MIB)、代理(Agent)以及被管对象4部分组成,SNMP的体系结构见图1。
snmp-rfc
1284 Definitions of Managed Objects for the Ethernet-like Interface
Types. J. Cook. December 1991. (Format: TXT=43225 bytes) (Obsoleted
by RFC1398) (Status: PROPOSED STANDARD)
TCP/IP-based internets. M.T. Rose, K. McCloghrie. May-01-1990.
(Format: TXT=40927 bytes) (Obsoletes RFC1065) (Also STD0016) (Status:
STANDARD)
M.L. Schoffstall, C. Davin. Apr-01-1989. (Format: TXT=71563 bytes)
(Obsoletes RFC1067) (Obsoleted by RFC1157) (Status: UNKNOWN)
1155 Structure and identification of management information for
1089 SNMP over Ethernet. M.L. Schoffstall, C. Davin, M. Fedor, J.D.
Case. Feb-01-1989. (Format: TXT=4458 bytes) (Status: UNKNOWN)
1098 Simple Network Management Protocol (SNMP). J.D. Case, M. Fedor,
Version 3. S. Willis, J.W. Burruss. Oct-01-1991. (Format: TXT=25717
最新软考工程师完整复习题库588题(
2020年软考工程师题库588题[含答案] 一、多选题1.雷电侵入计算机信息系统的途径主要有:(ABD)A.信息传输通道线侵入B.电源馈线侵入C.建筑物D.地电位反击2.使用esp协议时,可以使用的加密运算是。
(ABC)A.DESB.3DESC.AESD.RSA3.一个密码体系一般分为以下哪几个部分?(ABCD)A.xxB.xx密钥和xx密钥C.密文D.加密算法和xx算法4.利用密码技术,可以实现网络安全所要求的。
(ABCD)A.数据保密性B.数据完整性C.数据可用性D.身份验证5.员工区域安全守则包括:(ABCD)A.非工作时间,员工进入或离开办公区域,应在值班人员处登记B.外来人员进入办公区域或机房,相关员工必须全程陪同C.将物品带入/带出公司,要遵守公司相关的规定及流程D.参加会议时遵守会前.会中.会后的保密流程6.在实验室中引起火灾的通常原因包括:(ABCD)A.明火B.电器保养不良C.仪器设备在不使用时未关闭电源D.使用易燃物品时粗心大意7.硬件设备的使用管理包括(ABCD)。
A.严格按硬件设备的操作使用规程进行操作B.建立设备使用情况日志,并登记使用过程C.建立硬件设备故障情况登记表D.坚持对设备进行例行维护和保养8.使用配有计算机的仪器设备时,不应该做的有:(ABCD)A.更改登机密码和系统设置B.自行安装软件C.玩各种电脑游戏D.将获得的图像.数据等资料存储在未予指定的硬盘分区上9.计算机信息系统设备处于不同雷电活动地区,其雷电电磁场强度有很大差异,根据这一差异,将被防护空间分为下列哪些防护区?(ABCD)A.直击雷非防护区(LPZOA)B.直击雷防护区(LPZOB)C.第一防护区(LPZI)D.后续防护区(LPZ2,3..等)10.火灾自动报警.自动灭火系统部署应注意(ABCD)。
A.避开可能招致电磁干扰的区域或设备B.具有不间断的专用消防电源C.留备用电源D.具有自动和手动两种触发装置11.会导致电磁泄漏的有(ABCDE)A.显示器B.开关电路及接地系统C.计算机系统的电源线D.机房内的电话E.信号处理电12.168.0网段的12和33的主机访问C.然后配置TCP.EXCLUDED_NONES=192.168.0.123将会禁止地址是192.168.0网段的123的主机访问D.要以上配置生效必须重启lsnrctl监听器13.电信生产其机房作业,是由专门的值机员.机务员来完成,作业内容是:固定电话.无线电话.电报.载波.短波.微波.卫星和电力等电信通信设备,使设备出去良好状态,保证其正常运行。
mysql 数据库 审计日志流量回放 实现原理
mysql 数据库审计日志流量回放实现原理MySQL数据库审计日志流量回放实现原理主要是通过捕获和分析MySQL 数据库的审计日志,将这些日志信息重新构建成数据库流量,然后重新播放这些流量,从而实现对数据库操作的回放。
具体实现步骤如下:
1. 审计日志捕获:通过在MySQL数据库服务器上配置审计插件或使用第三方工具,捕获MySQL数据库的所有操作日志,包括用户登录、查询、更新等操作。
这些日志通常以文本格式存储。
2. 日志解析:对捕获的审计日志进行解析,提取出操作类型、操作时间、操作对象等信息。
这些信息将被用于重新构建数据库流量。
3. 流量构建:根据解析出的操作类型和操作对象等信息,重新构建数据库流量。
这通常需要编写代码,使用程序化的方式构建流量数据包。
4. 流量回放:将构建好的数据库流量数据包发送到MySQL数据库服务器,重新执行这些操作。
这可以通过编写脚本或使用第三方工具实现。
5. 结果验证:对回放的操作结果进行验证,确保与原始操作结果一致。
如果发现不一致的情况,需要进行进一步的分析和处理。
需要注意的是,实现MySQL数据库审计日志流量回放需要具备一定的技术实力和经验,需要对MySQL数据库的原理和网络通信有一定的了解。
同时,这种实现方式也需要对原始审计日志进行完整备份,以免在回放过程中出现数据丢失或损坏的情况。
宁德市有线电视分配接入网双向改造方案与实施
宁德市有线电视分配接入网双向改造方案与实施随着有线数字电视整体转换工作的加快推进,网络的改造建设再次成为有线电视行业的热点。
由于现有的HFC网在很多地方还没有完成双向改造,这样的网络只能满足基本广播电视节目的传送,而不能承载多媒体交互业务和增值业务,也不能有效实现网络、业务和用户管理。
因此,在目前的形势下,我们将如何选择一种较为合理的方案,进行网络双向建设改造,这已成为有线电视网络技术人员面临的重要课题。
本文在对比目前有线电视双向网络建设改造主流方案的基础上,结合宁德市城区的实际情况,提出宁德市有线电视分配接入网双向改造方案与实施。
1 接入网双向改造方案比较对目前有线电视网络的双向建设改造,主要分为城域干线网和用户分配网,其重点是用户分配接入网的双向改造。
有线电视分配接入网双向改造的应用技术方案较多,本文着重比较、介绍以下4种主流方案:CMTS+ CM(即CM方案)、EPON+LAN、EPON+EOC和FTTH方案。
1.1 基于HFC网络的CMTS+ CM方案(CM方案)CMTS(电缆调制解调器端接系统)+CM(电缆调制解调器)组网方案,它在分配接入网双向化改造中采用的C M技术;在光传输部分,下行数据信号和CATV的下行信号采用频分(FDM)方式共纤传输,上下行数据信号采用空分(SDM)方式共缆不同纤传输;在电缆部分,上下行信号按FDM方式同缆传输。
这一方案可利用已有HFC(混合光纤同轴网络)网络中预留的光纤和无源同轴分配入户的电缆,并组成双向传输系统,不需要重新铺线,只需在前端和用户端分别加装CMTS和CM 即可实现双向传输,前期投入少,改造工程量小,适合已建HFC网络改造。
但存在反向噪声汇聚,网络反向设计和工艺控制要求较高等问题,由于受CMTS的带宽限制,可承载业务有限,无法满足大带宽业务的需求,因此日后网络扩容投资相对较大。
1.2 EPON改造方案PON(无源光网)是为了支持点到多点应用发展起来的光接入系统。
FortiSwitch Data Center系列产品介绍说明书
DATA SHEETFortiSwitch ™ Data Center SeriesFortiSwitch Data Center switches deliver a Secure, Simple, Scalable Ethernet solution with outstanding throughput, resiliency, and scalability. Virtualization and cloud computing have created dense high-bandwidth Ethernet networking requirements. FortiSwitch Data Center switches meet these challenges by providing a high performance 10 GE, 40 GE, or 100 GE capable switching platform, with a low Total Cost of Ownership. Ideal for Top of Rack server or firewall aggregation applications, as well as SD-Branch network coredeployments, these switches are purpose-built to meetthe needs of today’s bandwidth intensive environments.Highlights§High throughput Ethernet switch suitable for Top of Rack or largeSD-Branch network deployments§ 1 GE, 10 GE, or 100 GE access ports, in a compact 1 RU form factor with 40 or 100 GE capable uplinks which includes breakout support for 2x50G, 4x25G, 4x10G, and 4x1G §FortiGate management through FortiLink, enabling the Security Fabric§Stackable up to 300 switches per FortiGate depending on model§Dual hot swappable power supplies for redundancy§Supports Wire-speed switching with both Store and Forward and Cut Through forwarding modesProduct OfferingsFortiSwitch 1024D, 1048E, 3032D, and 3032ESecurity Fabric Integration through FortiLinkThe FortiSwitch Data Center Series supports FortiGate managementthrough FortiLink, extending the Fortinet Security Fabric to the Ethernet port level. This link allows the same policies configured and applied to FortiGate interfaces to be applied to theFortiSwitch Ethernet ports, reducing complexity and decreasing management cost. With network security and access layer functions enabled and managed through a single console, centralized policy management, including role-based access and control, are easy to implement and manage. Users or devices can be authenticated against the same database and have the same security policy applied regardless of how or where they connect to the network.DATA SHEET | FortiSwitch™ Data Center SeriesDeploymentStandalone ModeThe FortiSwitch has a native GUI and CLI interface. All configuration and switch administration can be accomplished through either of theseinterfaces. Available ReSTful API’s offer additional configuration and management options.FortiLink ModeFortiLink is an innovative proprietary management protocol that allows our FortiGate Security Appliance to seamlessly manage any FortiSwitch. FortiLink enables the FortiSwitch to become a logical extension of the FortiGate integrating it directly into the Fortinet Security Fabric. This management option reduces complexity and decreases management cost as network security and access layer functions are enabled and managed through a single console.DATA SHEET | FortiSwitch ™ Data Center Series3HardwareFortiSwitch 3032D — frontFortiSwitch 3032D — backFortiSwitch 1048E — frontFortiSwitch 1048E — backFortiSwitch 1024D — backFortiSwitch 3032E — frontFortiSwitch 3032E — backFortiSwitch 1024D — frontDATA SHEET | FortiSwitch™ Data Center SeriesFeaturesLAG support for FortiLink Connection YesActive-Active Split LAG from FortiGate to FortiSwitches for Advanced Redundancy YesFORTISWITCH 1024D FORTISWITCH 1048E FORTISWITCH 3032D FORTISWITCH 3032E Layer 2Jumbo Frames Yes Yes Yes YesAuto-negotiation for port speed and duplex Yes Yes Yes YesIEEE 802.1D MAC Bridging/STP Yes Yes Yes YesIEEE 802.1w Rapid Spanning Tree Protocol (RSTP)Yes Yes Yes YesIEEE 802.1s Multiple Spanning Tree Protocol (MSTP)Yes Yes Yes YesSTP Root Guard Yes Yes Yes YesEdge Port / Port Fast Yes Yes Yes YesIEEE 802.1Q VLAN Tagging Yes Yes Yes YesPrivate VLAN Yes Yes Yes YesIEEE 802.3ad Link Aggregation with LACP Yes Yes Yes YesUnicast/Multicast traffic balance over trunking port(dst-ip, dst-mac, src-dst-ip, src-dst-mac, src-ip, src-mac)Yes Yes Yes YesIEEE 802.1AX Link Aggregation Yes Yes Yes YesSpanning Tree Instances (MSTP/CST)32/132/132/132/1IEEE 802.3x Flow Control and Back-pressure Yes Yes Yes YesIEEE 802.1Qbb Priority-based Flow Control Yes Yes Yes YesIEEE 802.3u 100Base-TX Yes No No YesIEEE 802.3z 1000Base-SX/LX Yes Yes Yes YesIEEE 802.3ab 1000Base-T Yes Yes No YesDATA SHEET | FortiSwitch™ Data Center Series Features* Requires ‘Advanced Features’ License5DATA SHEET | FortiSwitch™ Data Center Series RFC ComplianceRFC and MIB Support*BFDRFC 5880: Bidirectional Forwarding Detection (BFD)RFC 5881: Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop)RFC 5882: Generic Application of Bidirectional Forwarding Detection (BFD)BGPRFC 1771: A Border Gateway Protocol 4 (BGP-4)RFC 1965: Autonomous System Confederations for BGPRFC 1997: BGP Communities AttributeRFC 2545: Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain RoutingRFC 2796: BGP Route Reflection - An Alternative to Full Mesh IBGPRFC 2842: Capabilities Advertisement with BGP-4RFC 2858: Multiprotocol Extensions for BGP-4RFC 4271: BGP-4RFC 6286: Autonomous-System-Wide Unique BGP Identifier for BGP-4RFC 6608: Subcodes for BGP Finite State Machine ErrorRFC 6793: BGP Support for Four-Octet Autonomous System (AS) Number SpaceRFC 7606: Revised Error Handling for BGP UPDATE MessagesRFC 7607: Codification of AS 0 ProcessingRFC 7705: Autonomous System Migration Mechanisms and Their Effects on the BGP AS_PATH Attribute RFC 8212: Default External BGP (EBGP) Route Propagation Behavior without PoliciesRFC 8654: Extended Message Support for BGPDHCPRFC 2131: Dynamic Host Configuration ProtocolRFC 3046: DHCP Relay Agent Information OptionRFC 7513: Source Address Validation Improvement (SAVI) Solution for DHCPIP/IPv4RFC 3168: The Addition of Explicit Congestion Notification (ECN) to IPRFC 5227: IPv4 Address Conflict DetectionRFC 5517: Cisco Systems' Private VLANs: Scalable Security in a Multi-Client EnvironmentRFC 7039: Source Address Validation Improvement (SAVI) FrameworkIP MulticastRFC 2362: Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol SpecificationRFC 2710: Multicast Listener Discovery (MLD) for IPv6 (MLDv1)RFC 4541: Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping SwitchesRFC 4605: Internet Group Management Protocol (IGMP)/Multicast Listener Discovery (MLD)-Based Multicast Forwarding (“IGMP/MLD Proxying”)RFC 4607: Source-Specific Multicast for IPIPv6RFC 2464: Transmission of IPv6 Packets over Ethernet Networks: Transmission of IPv6 Packets over Ethernet NetworksRFC 2474: Definition of the Differentiated Services Field (DS Field) in the and IPv6 Headers (DSCP) RFC 2893: Transition Mechanisms for IPv6 Hosts and RoutersRFC 4213: Basic Transition Mechanisms for IPv6 Hosts and RouterRFC 4291: IP Version 6 Addressing ArchitectureRFC 4443: Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification RFC 4861: Neighbor Discovery for IP version 6 (IPv6)RFC 4862: IPv6 Stateless Address Auto configurationRFC 5095: Deprecation of Type 0 Routing Headers in IPv6RFC 6724: Default Address Selection for Internet Protocol version 6 (IPv6)RFC 7113: IPv6 RA GuardRFC 8200: Internet Protocol, Version 6 (IPv6) SpecificationRFC 8201: Path MTU Discovery for IP version 6IS-ISRFC 1195: Use of OSI IS-IS for Routing in TCP/IP and Dual EnvironmentsRFC 5308: Routing IPv6 with IS-ISMIBMIBRFC 1724: RIPv2-MIBRFC 1850: OSPF Version 2 Management Information BaseRFC 2233: The Interfaces Group MIB using SMIv2RFC 2618: Radius-Auth-Client-MIBRFC 2620: Radius-Acc-Client-MIBRFC 2674: Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering and Virtual LAN extensionsRFC 2787: Definitions of Managed Objects for the Virtual Router Redundancy ProtocolRFC 2819: Remote Network Monitoring Management Information BaseRFC 2932: IPv4 Multicast Routing MIBRFC 2934: Protocol Independent Multicast MIB for IPv4RFC 3289: Management Information Base for the Differentiated Services ArchitectureRFC 3433: Entity Sensor Management Information BaseRFC 3621: Power Ethernet MIBRFC 6933: Entity MIB (Version 4)OSPFRFC 1583: OSPF version 2RFC 1765: OSPF Database OverflowRFC 2328: OSPF version 2RFC 2370: The OSPF Opaque LSA OptionRFC 2740: OSPF for IPv6RFC 3101: The OSPF Not-So-Stubby Area (NSSA) OptionRFC 3137: OSPF Stub Router AdvertisementRFC 3623: OSPF Graceful RestartRFC 5340: OSPF for IPv6 (OSPFv3)RFC 5709: OSPFv2 HMAC-SHA Cryptographic AuthenticationRFC 6549: OSPFv2 Multi-Instance ExtensionsRFC 6845: OSPF Hybrid Broadcast and Point-to-Multipoint Interface TypeRFC 6860: Hiding Transit-Only Networks in OSPFRFC 7474: Security Extension for OSPFv2 When Using Manual Key ManagementRFC 7503: OSPF for IPv6RFC 8042: CCITT Draft Recommendation T.4RFC 8362: OSPFv3 Link State Advertisement (LSA) ExtensibilityOTHERRFC 2030: SNTPRFC 3176: InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed NetworksRFC 3768: VRRPRFC 3954: Cisco Systems NetFlow Services Export Version 9RFC 5101: Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow InformationRFC 5798: VRRPv3 (IPv4 and IPv6)RADIUSRFC 2865: Admin Authentication Using RADIUSRFC 2866: RADIUS AccountingRFC 5176: Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)RIPRFC 1058: Routing Information ProtocolRFC 2080: RIPng for IPv6RFC 2082: RIP-2 MD5 AuthenticationRFC 2453: RIPv2RFC 4822: RIPv2 Cryptographic AuthenticationSNMPRFC 1157: SNMPv1/v2cRFC 2571: Architecture for Describing SNMPDATA SHEET | FortiSwitch ™ Data Center Series7Specifications* Full line rate with minimum packet size of 427bytes on FS-1048E** Fortinet Warranty Policy:/doc/legal/EULA.pdfDATA SHEET | FortiSwitch ™ Data Center Series8Specifications* Full line rate with minimum packet size of 250bytes on FS-3032E, 194bytes on FS-3032D ** Fortinet Warranty Policy:/doc/legal/EULA.pdfDATA SHEET | FortiSwitch™ Data Center Series Order InformationFS-SW-LIC-3000SW License for FS-3000 Series Switches to activate Advanced Features.AC Power Supply FS-PSU-460Spare AC power supply for FS-1048E/1024DFS-PSU-800Spare AC power supply for FS-3032E* When managing a FortiSwitch with a FortiGate via FortiGate Cloud, no additional license is necessary.For details of Transceiver modules, see the Fortinet Transceivers datasheet. Copyright © 2020 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.FST-PROD-DS-SW4FS-DC-DAT-R23-202011。
FortiSwitch
DATA SHEETFortiSwitch ™ Secure Access FamilyHighlights§Designed for installations from desktops to wiring closets§Ideal for SD-Branch deployments §Centralized security and accessmanagement from FortiGate interfaces with FortiLink§Optimal for converged network environments; enabling voice, data, and wireless traffic to be delivered across a single network§Supports non-FortiLink deployments through onboard GUI, API, or command line configuration§Up to 48 ports in a compact 1 RU form factor§Stackable up to 300 switches per FortiGate, depending on model§Supports Wire-speed switching and Store and Forward forwarding modeThe FortiSwitch TM Secure Access Family deliversoutstanding security, performance, and manageability. Secure, Simple, and Scalable, FortiSwitch is the right choice for threat-conscious businesses of all sizes. Tightly integrated into the Fortinet Security Fabric via FortiLink, FortiSwitch can be managed directly from the familiar FortiGate interface. This single pane of glass management provides complete visibility and control ofusers and devices on the network regardless of how they connect. This makes the FortiSwitch ideal for SD-Branch deployments with applications that range from desktop to data center aggregation, enabling businesses to converge their security and network access.Security Fabric Integration through FortiLinkFortiLink is an innovative proprietary management protocol that allows our FortiGate Next Generation Firewall toseamlessly manage any FortiSwitch. FortiLink enables the FortiSwitch to become a logical extension of the FortiGate, integrating itdirectly into the Fortinet Security Fabric. This management option reduces complexity and decreases management costs as network security and access layer functions are enabled and managed through a single console. FortiLink integration enables centralized policy management, including role-based access and control, making it easy to implement and manage. This control and manageability make FortiSwitch ideal for SD-Branch deployments.Product OfferingsFS-108E, 108E-POE, 108E-FPOE, 124E, 124E-POE, 124E-FPOE, 148E, 148E-POE, 224D-FPOE, 224E, 224E-POE, 248D,248E-POE, 248E-FPOE, 424D, 424D-POE, 424D-FPOE, 448D, 448D-POE, 448D-FPOE, 424E-FIBER, M426E-FPOE, 424E, 424E-POE, 424E-FPOE, 448E, 448E-POE, 448E-FPOE,524-D, 524D-FPOE, 548D, 548D-FPOECloud Management OptionFortiGate CloudDATA SHEET | FortiSwitch™ Secure Access FamilyFeaturesLAG support for FortiLink Connection YesActive-Active Split LAG from FortiGate to FortiSwitches for Advanced Redundancy Yes (with FS-2xx, 4xx, 5xx)FORTISWITCH2XXD, 4XXD, 5XXD SERIESFORTISWITCH2XXE, 4XXE SERIESFORTISWITCH1XXE SERIES Layer 2Jumbo Frames Yes Yes YesAuto-negotiation for Port Speed and Duplex Yes Yes YesMDI/MDIX Auto-crossover Yes Yes YesIEEE 802.1D MAC Bridging/STP Yes Yes YesIEEE 802.1w Rapid Spanning Tree Protocol (RSTP)Yes Yes YesIEEE 802.1s Multiple Spanning Tree Protocol (MSTP)Yes Yes YesSTP Root Guard Yes Yes YesSTP BPDU Guard Yes Yes YesEdge Port / Port Fast Yes Yes YesIEEE 802.1Q VLAN Tagging Yes Yes YesPrivate VLAN Yes Yes NoIEEE 802.3ad Link Aggregation with LACP Yes Yes YesUnicast/Multicast traffic balance over trunking port (dst-ip, dst-mac, src-dst-ip, src-dst-mac, src-ip, src-mac)Yes Yes YesIEEE 802.1AX Link Aggregation Yes Yes Yes Spanning Tree Instances (MSTP/CST)15/115/115/1IEEE 802.3x Flow Control and Back-pressure Yes Yes YesIEEE 802.3 10Base-T Yes Yes YesIEEE 802.3u 100Base-TX Yes Yes YesIEEE 802.3z 1000Base-SX/LX Yes Yes YesIEEE 802.3ab 1000Base-T Yes Yes YesIEEE 802.3ae 10 Gigabit Ethernet4xx and 5xx Family N/A N/ADATA SHEET | FortiSwitch™ Secure Access FamilyFeaturesTelnet / SSH Yes Yes Yes HTTP / HTTPS Yes Yes Yes SNMP v1/v2c/v3Yes Yes Yes SNTP Yes Yes Yes Standard CLI and Web GUI Interface Yes Yes YesDATA SHEET | FortiSwitch ™ Secure Access Family5FeaturesAdditional RFC and MIB SupportRFC 2571 Architecture for Describing SNMP Yes Yes Yes DHCP ClientYes Yes Yes RFC 854 Telnet Server Yes Yes Yes RFC 2865 RADIUSYes Yes Yes RFC 1643 Ethernet-like Interface MIB Yes Yes Yes RFC 1213 MIB-IIYes Yes Yes RFC 1354 IP Forwarding Table MIBYes Yes Yes RFC 2572 SNMP Message Processing and Dispatching Yes Yes Yes RFC 1573 SNMP MIB II Yes Yes Yes RFC 1157 SNMPv1/v2c Yes Yes Yes RFC 2030 SNTPYes Yes Yes RFC 6933 Entity MIB (Version 4)Yes Yes Yes RFC 3621 Power Ethernet MIBYes Yes Yes RFC 3433 Entity Sensor Management Information BaseYes Yes Yes RFC 2819 Remote Network Monitoring Management Information BaseYes Yes Yes RFC 2787 Definitions of Managed Objects for the Virtual Router Redundancy Protocol Yes Yes Yes RFC 2620 RADIUS Accounting Client MIB Yes Yes Yes RFC 2618 RADIUS Authentication Client MIB Yes Yes Yes RFC 2576 Coexistence between SNMP versions Yes Yes Yes RFC 2573 SNMP Applications Yes Yes Yes RFC 2571 SNMP Frameworks Yes Yes Yes RFC 2233 Interface MIB Yes Yes Yes RFC 1493 Bridge MIBYes Yes Yes RFC 3289 Management Information Base for the Differentiated Services Architecture Yes Yes -RFC 2934 Protocol Independent Multicast MIB for IPv4Yes Yes -RFC 2932 IPv4 Multicast Routing MIBYes Yes -RFC 2674 Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering and Virtual LAN ExtensionsYesYes -RFC 2362 Protocol Independent Multicast-Sparse Mode (PIM-SM)Yes Yes -RFC 2328 OSPF v2Yes Yes -RFC 1850 OSPFv2 MIB Yes Yes -RFC 1724 RIPv2 MIBYes Yes -RFC 3289 Management Information Base for the Differentiated Services Architecture YesYes-RFC 2934 Protocol Independent Multicast MIB for IPv4Yes (4XX/5XX only)Yes (4XX only)-RFC 2932 IPv4 Multicast Routing MIBYes (4XX/5XX only)Yes (4XX only)-RFC 2674 Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering and Virtual LAN ExtensionsYesYes -RFC 2362 Protocol Independent Multicast-Sparse Mode (PIM-SM)Yes (4XX/5XX only)Yes (4XX only)-RFC 2328 OSPF v2Yes Yes -RFC 1850 OSPFv2 MIB Yes Yes -RFC 1724 RIPv2 MIBYesYes-DATA SHEET | FortiSwitch ™ Secure Access Family6Specifications* Fortinet Warranty Policy:/doc/legal/EULA.pdfFortiSwitch 108E FortiSwitch 108E-POE FortiSwitch 108E-FPOEDATA SHEET | FortiSwitch ™ Secure Access Family7* Fortinet Warranty Policy: /doc/legal/EULA.pdfSpecificationsFortiSwitch 124E FortiSwitch 124E-POEFortiSwitch 124E-FPOEDATA SHEET | FortiSwitch™ Secure Access Family8* Fortinet Warranty Policy: /doc/legal/EULA.pdfSpecificationsFortiSwitch 148E FortiSwitch 148E-POEDATA SHEET | FortiSwitch ™ Secure Access Family9Specifications* Fortinet Warranty Policy:/doc/legal/EULA.pdfFortiSwitch 224D-FPOE FortiSwitch 224EFortiSwitch 224E-POEDATA SHEET | FortiSwitch ™ Secure Access Family10Specifications* Fortinet Warranty Policy:/doc/legal/EULA.pdfFortiSwitch 248E-POEFortiSwitch 248E-FPOEFortiSwitch 248D11* Fortinet Warranty Policy:/doc/legal/EULA.pdfFortiSwitch 424D-FPOEFortiSwitch 424DFortiSwitch 424D-POE12* Fortinet Warranty Policy:/doc/legal/EULA.pdfFortiSwitch 448D-FPOEFortiSwitch 448DFortiSwitch 448D-POEFORTISWITCH-424E-FIBER* Fortinet Warranty Policy: /doc/legal/EULA.pdfFortiSwitch 424E-Fiber FortiSwitch M426E-FPOE1314* Fortinet Warranty Policy:/doc/legal/EULA.pdfFortiSwitch 424E-FPOEFortiSwitch 424EFortiSwitch 424E-POE15FORTISWITCH 448E-FPOE48x GE RJ45 and 4x 10GE SFP+ portsNote: SFP+ ports are compatible with 1 GE SFP 1* Fortinet Warranty Policy: /doc/legal/EULA.pdfFortiSwitch 448E-FPOEFortiSwitch 448E FortiSwitch 448E-POE16*FS-524D, FS-524D-FPOE, FS-548D, FS-548D-FPOE Power Supply Units are Hot-Swappable** Fortinet Warranty Policy: /doc/legal/EULA.pdfFortiSwitch 548D-FPOE FortiSwitch 548DFortiSwitch 524D-FPOE FortiSwitch 524DProduct SKU DescriptionFortiSwitch 108E FS-108E Layer 2 FortiGate switch controller compatible switch with 8 GE RJ45 + 2 SFP ports, line AC and PSE dual powered. Fanless. FortiSwitch 108E-POE FS-108E-POE Layer 2 FortiGate switch controller compatible PoE+ switch with 8 GE RJ45 + 2 SFP ports,4 port PoE with maximum 65 W PoE limit. Fanless.FortiSwitch 108E-FPOE FS-108E-FPOE Layer 2 FortiGate switch controller compatible PoE+ switch with 8 GE RJ45 + 2 SFP ports,8 port PoE with maximum 130 W PoE limit. Fanless.FortiSwitch 124E FS-124E Layer 2 FortiGate switch controller compatible switch with 24 GE RJ45 + 4 SFP ports. Fanless.FortiSwitch 124E-POE FS-124E-POE Layer 2 FortiGate switch controller compatible PoE+ switch with 24 GE RJ45 + 4 SFP ports, 12 port PoE with maximum 185 W limit. FortiSwitch 124E-F-POE FS-124E-FPOE Layer 2 FortiGate switch controller compatible PoE+ switch with 24 GE RJ45 + 4 SFP ports, 24 port PoE with maximum 370 W limit. FortiSwitch 148E FS-148E Layer 2 FortiGate switch controller compatible switch with 48 GE RJ45 + 4 SFP ports.FortiSwitch 148E-POE FS-148E-POE Layer 2 FortiGate switch controller compatible PoE+ switch with 48 GE RJ45 + 4 SFP ports, 24 port PoE with maximum 370 W limit. FortiSwitch 224D-FPOE FS-224D-FPOE Layer 2/3 FortiGate switch controller compatible PoE+ switch with 24 GE RJ45 + 4 SFP ports,24 port PoE with maximum 370 W limit.FortiSwitch 224E FS-224E Layer 2/3 FortiGate switch controller compatible switch with 24 GE RJ45 + 4 SFP ports. Fanless.FortiSwitch 224E-POE FS-224E-POE Layer 2/3 FortiGate switch controller compatible PoE+ switch with 24 GE RJ45 + 4 SFP ports,12 port PoE with maximum 180 W limit.FortiSwitch 248D FS-248D Layer 2/3 FortiGate switch controller compatible switch with 48 GE RJ45 + 4 SFP ports.FortiSwitch 248E-POE FS-248E-POE Layer 2/3 FortiGate switch controller compatible PoE+ switch with 48 GE RJ45 + 4 SFP ports,24 port PoE with maximum 370 W limit.FortiSwitch 248E-FPOE FS-248E-FPOE Layer 2/3 FortiGate switch controller compatible PoE+ switch with 48 GE RJ45 + 4 SFP ports,48 port PoE with maximum 740 W limit.FortiSwitch 424D FS-424D Layer 2/3 FortiGate switch controller compatible switch with 24 GE RJ45 + 2x 10 GE SFP+ ports.FortiSwitch 424D-POE FS-424D-POE Layer 2/3 FortiGate switch controller compatible PoE+ switch with 24 GE RJ45 + 2x 10 GE SFP+ ports,24 port PoE with maximum 185 W limit.FortiSwitch 424D-FPOE FS-424D-FPOE Layer 2/3 FortiGate switch controller compatible PoE+ switch with 24 GE RJ45 + 2x 10 GE SFP+ ports,24 port PoE with maximum 370 W limit.FortiSwitch 448D FS-448D Layer 2/3 FortiGate switch controller compatible switch with 48 GE RJ45 + 4x 10 GE SFP+ ports.FortiSwitch 448D-POE FS-448D-POE Layer 2/3 FortiGate switch controller compatible PoE+ switch with 48 GE RJ45 + 4x 10 GE SFP+ ports,48 port PoE with maximim 370 W limit.FortiSwitch 448D-FPOE FS-448D-FPOE Layer 2/3 FortiGate switch controller compatible PoE+ switch with 48 GE RJ45 + 4x 10 GE SFP+ ports,48 port PoE with maximum 740 W limit.FortiSwitch 424E-Fiber FS-424E-Fiber Layer 2/3 FortiGate switch controller compatible switch with 24x GE SFP and 4x 10 GE SFP+ UplinksFortiSwitch M426E-FPOE FS-M426E-FPOE Layer 2/3 FortiGate switch controller compatible PoE+/UPoE switch with 16x GE RJ45, 8x 2.5 RJ45, 2x 5 GE RJ45 and4x 10 GE SFP+, 24 port PoE with maximum 420 W limit.FortiSwitch 424E FS-424E Layer 2/3 FortiGate switch controller compatible switch with 24 GE RJ45, 4x 10 GE SFP + ports.FortiSwitch 424E-POE FS-424E-POE Layer 2/3 FortiGate switch controller compatible switch with 24 GE RJ45, 4x 10 GE SFP + ports,24 port PoE with maximum 283.5 W limit.FortiSwitch 424E-FPOE FS-424E-FPOE Layer 2/3 FortiGate switch controller compatible switch with 24 GE RJ45, 4x 10 GE SFP + ports,24 port PoE with maximum 433.7 W limit.FortiSwitch 448E FS-448E Layer 2/3 FortiGate switch controller compatible switch with 48 GE RJ45, 4x 10 GE SFP + ports.FortiSwitch 448E-POE FS-448E-POE Layer 2/3 FortiGate switch controller compatible switch with 48 GE RJ45, 4x 10 GE SFP + ports, 48 port PoE with maximum 421 W limit.FortiSwitch 448E-FPOE FS-448E-FPOE Layer 2/3 FortiGate switch controller compatible switch with 48 GE RJ45, 4x 10 GE SFP + ports, 48 port PoE with maximum 772 W limit.FortiSwitch 524D FS-524D Layer 2/3 FortiGate switch controller compatible switch with 24 GE RJ45, 4x 10 GE SFP+ and 2x 40 GE QSFP+ ports. FortiSwitch 524D-FPOE FS-524D-FPOE Layer 2/3 FortiGate switch controller compatible PoE+ switch with 24 GE RJ45, 4x 10 GE SFP+, 2x 40 GE QSFP+ ports,24 port PoE with maximum 400 W limit.FortiSwitch 548D FS-548D Layer 2/3 FortiGate switch controller compatible switch with 48 GE RJ45, 4x 10 GE SFP+ and 2x 40 GE QSFP+ ports. FortiSwitch 548D-FPOE FS-548D-FPOE Layer 2/3 FortiGate switch controller compatible PoE+ switch with 48 GE RJ45, 4x 10 GE SFP+ and 2x 40 GE QSFP+ ports,48 port PoE with maximum 750 W limit.FortiSwitch Cloud Management License*FC-10-WMSC1-190-02-DD FortiSwitch Cloud Management License subscription 1 Year Contract.17AccessoriesFortiSwitch Advanced Features License FS-SW-LIC-200SW License for FS-200 Series Switches to activate Advanced Features.FS-SW-LIC-400SW License for FS-400 Series Switches to activate Advanced Features.FS-SW-LIC-500SW License for FS-500 Series Switches to activate Advanced Features.External Redundant AC Power Supply FRPS-740Redundant AC power supply for up to 2 units: FS-224D-FPOE, FS-248D-FPOE, FS-424D-FPOE, FS-448D-POE and FS-424D-POE. Redundant AC Power Supply FS-PSU-150AC power supply for FS-548D and FS-524D.FS-PSU-600AC power supply for FS-524D-FPOE.**FS-PSU-900AC power supply for FS-548D-FPOE.*** When managing a FortiSwitch with a FortiGate via FortiGate Cloud, no additional license is necessary.** Provides additional PoE capacity.For details of Transceiver modules, see the Fortinet Transceivers datasheet.Note that all PoE FortiSwitches are Alternative-A. Copyright © 2020 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.FST-PROD-DS-SW3FS-SA-DAT-R38-202007。
RFC1157
Network Working Group J. Case Request for Comments: 1157 SNMP Research Obsoletes: RFC 1098 M. Fedor Performance Systems International M. Schoffstall Performance Systems International J. Davin MIT Laboratory for Computer Science May 1990 A Simple Network Management Protocol (SNMP)Table of Contents1. Status of this Memo (2)2. Introduction (2)3. The SNMP Architecture (5)3.1 Goals of the Architecture (5)3.2 Elements of the Architecture (5)3.2.1 Scope of Management Information (6)3.2.2 Representation of Management Information (6)3.2.3 Operations Supported on Management Information (7)3.2.4 Form and Meaning of Protocol Exchanges (8)3.2.5 Definition of Administrative Relationships (8)3.2.6 Form and Meaning of References to Managed Objects .. 123.2.6.1 Resolution of Ambiguous MIB References (12)3.2.6.2 Resolution of References across MIB Versions (12)3.2.6.3 Identification of Object Instances (12)3.2.6.3.1 ifTable Object Type Names (13)3.2.6.3.2 atTable Object Type Names (13)3.2.6.3.3 ipAddrTable Object Type Names (14)3.2.6.3.4 ipRoutingTable Object Type Names (14)3.2.6.3.5 tcpConnTable Object Type Names (14)3.2.6.3.6 egpNeighTable Object Type Names (15)4. Protocol Specification (16)4.1 Elements of Procedure (17)4.1.1 Common Constructs (19)4.1.2 The GetRequest-PDU (20)4.1.3 The GetNextRequest-PDU (21)4.1.3.1 Example of Table Traversal (23)4.1.4 The GetResponse-PDU (24)4.1.5 The SetRequest-PDU (25)4.1.6 The Trap-PDU (27)4.1.6.1 The coldStart Trap (28)4.1.6.2 The warmStart Trap (28)4.1.6.3 The linkDown Trap (28)4.1.6.4 The linkUp Trap (28)Case, Fedor, Schoffstall, & Davin [Page 1]RFC 1157 SNMP May 1990 4.1.6.5 The authenticationFailure Trap (28)4.1.6.6 The egpNeighborLoss Trap (28)4.1.6.7 The enterpriseSpecific Trap (29)5. Definitions (30)6. Acknowledgements (33)7. References (34)8. Security Considerations (35)9. Authors' Addresses (35)1. Status of this MemoThis RFC is a re-release of RFC 1098, with a changed "Status of this Memo" section plus a few minor typographical corrections. This memo defines a simple protocol by which management information for anetwork element may be inspected or altered by logically remoteusers. In particular, together with its companion memos whichdescribe the structure of management information along with themanagement information base, these documents provide a simple,workable architecture and system for managing TCP/IP-based internets and in particular the Internet.The Internet Activities Board recommends that all IP and TCPimplementations be network manageable. This implies implementation of the Internet MIB (RFC-1156) and at least one of the tworecommended management protocols SNMP (RFC-1157) or CMOT (RFC-1095). It should be noted that, at this time, SNMP is a full Internetstandard and CMOT is a draft standard. See also the Host and Gateway Requirements RFCs for more specific information on the applicability of this standard.Please refer to the latest edition of the "IAB Official ProtocolStandards" RFC for current information on the state and status ofstandard Internet protocols.Distribution of this memo is unlimited.2. IntroductionAs reported in RFC 1052, IAB Recommendations for the Development of Internet Network Management Standards [1], a two-prong strategy for network management of TCP/IP-based internets was undertaken. In the short-term, the Simple Network Management Protocol (SNMP) was to be used to manage nodes in the Internet community. In the long-term,the use of the OSI network management framework was to be examined. Two documents were produced to define the management information: RFC 1065, which defined the Structure of Management Information (SMI)[2], and RFC 1066, which defined the Management Information Base(MIB) [3]. Both of these documents were designed so as to beCase, Fedor, Schoffstall, & Davin [Page 2]RFC 1157 SNMP May 1990 compatible with both the SNMP and the OSI network managementframework.This strategy was quite successful in the short-term: Internet-based network management technology was fielded, by both the research and commercial communities, within a few months. As a result of this,portions of the Internet community became network manageable in atimely fashion.As reported in RFC 1109, Report of the Second Ad Hoc NetworkManagement Review Group [4], the requirements of the SNMP and the OSI network management frameworks were more different than anticipated.As such, the requirement for compatibility between the SMI/MIB andboth frameworks was suspended. This action permitted the operational network management framework, the SNMP, to respond to new operational needs in the Internet community by producing documents defining new MIB items.The IAB has designated the SNMP, SMI, and the initial Internet MIB to be full "Standard Protocols" with "Recommended" status. By thisaction, the IAB recommends that all IP and TCP implementations benetwork manageable and that the implementations that are networkmanageable are expected to adopt and implement the SMI, MIB, andSNMP.As such, the current network management framework for TCP/IP- based internets consists of: Structure and Identification of ManagementInformation for TCP/IP-based Internets, which describes how managed objects contained in the MIB are defined as set forth in RFC 1155[5]; Management Information Base for Network Management of TCP/IP-based Internets, which describes the managed objects contained in the MIB as set forth in RFC 1156 [6]; and, the Simple Network Management Protocol, which defines the protocol used to manage these objects, as set forth in this memo.As reported in RFC 1052, IAB Recommendations for the Development of Internet Network Management Standards [1], the Internet ActivitiesBoard has directed the Internet Engineering Task Force (IETF) tocreate two new working groups in the area of network management. One group was charged with the further specification and definition ofelements to be included in the Management Information Base (MIB).The other was charged with defining the modifications to the Simple Network Management Protocol (SNMP) to accommodate the short-termneeds of the network vendor and operations communities, and to align with the output of the MIB working group.The MIB working group produced two memos, one which defines aStructure for Management Information (SMI) [2] for use by the managed Case, Fedor, Schoffstall, & Davin [Page 3]RFC 1157 SNMP May 1990 objects contained in the MIB. A second memo [3] defines the list of managed objects.The output of the SNMP Extensions working group is this memo, which incorporates changes to the initial SNMP definition [7] required to attain alignment with the output of the MIB working group. Thechanges should be minimal in order to be consistent with the IAB'sdirective that the working groups be "extremely sensitive to the need to keep the SNMP simple." Although considerable care and debate has gone into the changes to the SNMP which are reflected in this memo, the resulting protocol is not backwardly-compatible with itspredecessor, the Simple Gateway Monitoring Protocol (SGMP) [8].Although the syntax of the protocol has been altered, the originalphilosophy, design decisions, and architecture remain intact. Inorder to avoid confusion, new UDP ports have been allocated for use by the protocol described in this memo.Case, Fedor, Schoffstall, & Davin [Page 4]RFC 1157 SNMP May 1990 3. The SNMP ArchitectureImplicit in the SNMP architectural model is a collection of network management stations and network elements. Network managementstations execute management applications which monitor and controlnetwork elements. Network elements are devices such as hosts,gateways, terminal servers, and the like, which have managementagents responsible for performing the network management functionsrequested by the network management stations. The Simple NetworkManagement Protocol (SNMP) is used to communicate managementinformation between the network management stations and the agents in the network elements.3.1. Goals of the ArchitectureThe SNMP explicitly minimizes the number and complexity of management functions realized by the management agent itself. This goal isattractive in at least four respects:(1) The development cost for management agent softwarenecessary to support the protocol is accordingly reduced.(2) The degree of management function that is remotelysupported is accordingly increased, thereby admittingfullest use of internet resources in the management task.(3) The degree of management function that is remotelysupported is accordingly increased, thereby imposing thefewest possible restrictions on the form andsophistication of management tools.(4) Simplified sets of management functions are easilyunderstood and used by developers of network managementtools.A second goal of the protocol is that the functional paradigm formonitoring and control be sufficiently extensible to accommodateadditional, possibly unanticipated aspects of network operation and management.A third goal is that the architecture be, as much as possible,independent of the architecture and mechanisms of particular hosts or particular gateways.3.2. Elements of the ArchitectureThe SNMP architecture articulates a solution to the networkmanagement problem in terms of:Case, Fedor, Schoffstall, & Davin [Page 5]RFC 1157 SNMP May 1990 (1) the scope of the management information communicated bythe protocol,(2) the representation of the management informationcommunicated by the protocol,(3) operations on management information supported by theprotocol,(4) the form and meaning of exchanges among managemententities,(5) the definition of administrative relationships amongmanagement entities, and(6) the form and meaning of references to managementinformation.3.2.1. Scope of Management InformationThe scope of the management information communicated by operation of the SNMP is exactly that represented by instances of all non-aggregate object types either defined in Internet-standard MIB ordefined elsewhere according to the conventions set forth inInternet-standard SMI [5].Support for aggregate object types in the MIB is neither required for conformance with the SMI nor realized by the SNMP.3.2.2. Representation of Management InformationManagement information communicated by operation of the SNMP isrepresented according to the subset of the ASN.1 language [9] that is specified for the definition of non-aggregate types in the SMI.The SGMP adopted the convention of using a well-defined subset of theASN.1 language [9]. The SNMP continues and extends this tradition by utilizing a moderately more complex subset of ASN.1 for describingmanaged objects and for describing the protocol data units used for managing those objects. In addition, the desire to ease eventualtransition to OSI-based network management protocols led to thedefinition in the ASN.1 language of an Internet-standard Structure of Management Information (SMI) [5] and Management Information Base(MIB) [6]. The use of the ASN.1 language, was, in part, encouraged by the successful use of ASN.1 in earlier efforts, in particular, the SGMP. The restrictions on the use of ASN.1 that are part of the SMI contribute to the simplicity espoused and validated by experiencewith the SGMP.Case, Fedor, Schoffstall, & Davin [Page 6]RFC 1157 SNMP May 1990 Also for the sake of simplicity, the SNMP uses only a subset of the basic encoding rules of ASN.1 [10]. Namely, all encodings use thedefinite-length form. Further, whenever permissible, non-constructor encodings are used rather than constructor encodings. Thisrestriction applies to all aspects of ASN.1 encoding, both for thetop-level protocol data units and the data objects they contain.3.2.3. Operations Supported on Management InformationThe SNMP models all management agent functions as alterations orinspections of variables. Thus, a protocol entity on a logicallyremote host (possibly the network element itself) interacts with the management agent resident on the network element in order to retrieve (get) or alter (set) variables. This strategy has at least twopositive consequences:(1) It has the effect of limiting the number of essentialmanagement functions realized by the management agent totwo: one operation to assign a value to a specifiedconfiguration or other parameter and another to retrievesuch a value.(2) A second effect of this decision is to avoid introducinginto the protocol definition support for imperativemanagement commands: the number of such commands is inpractice ever-increasing, and the semantics of suchcommands are in general arbitrarily complex.The strategy implicit in the SNMP is that the monitoring of network state at any significant level of detail is accomplished primarily by polling for appropriate information on the part of the monitoringcenter(s). A limited number of unsolicited messages (traps) guidethe timing and focus of the polling. Limiting the number ofunsolicited messages is consistent with the goal of simplicity andminimizing the amount of traffic generated by the network management function.The exclusion of imperative commands from the set of explicitlysupported management functions is unlikely to preclude any desirable management agent operation. Currently, most commands are requestseither to set the value of some parameter or to retrieve such avalue, and the function of the few imperative commands currentlysupported is easily accommodated in an asynchronous mode by thismanagement model. In this scheme, an imperative command might berealized as the setting of a parameter value that subsequentlytriggers the desired action. For example, rather than implementing a "reboot command," this action might be invoked by simply setting aparameter indicating the number of seconds until system reboot. Case, Fedor, Schoffstall, & Davin [Page 7]RFC 1157 SNMP May 1990 3.2.4. Form and Meaning of Protocol ExchangesThe communication of management information among management entities is realized in the SNMP through the exchange of protocol messages.The form and meaning of those messages is defined below in Section 4. Consistent with the goal of minimizing complexity of the management agent, the exchange of SNMP messages requires only an unreliabledatagram service, and every message is entirely and independentlyrepresented by a single transport datagram. While this documentspecifies the exchange of messages via the UDP protocol [11], themechanisms of the SNMP are generally suitable for use with a widevariety of transport services.3.2.5. Definition of Administrative RelationshipsThe SNMP architecture admits a variety of administrativerelationships among entities that participate in the protocol. The entities residing at management stations and network elements which communicate with one another using the SNMP are termed SNMPapplication entities. The peer processes which implement the SNMP, and thus support the SNMP application entities, are termed protocol entities.A pairing of an SNMP agent with some arbitrary set of SNMPapplication entities is called an SNMP community. Each SNMPcommunity is named by a string of octets, that is called thecommunity name for said community.An SNMP message originated by an SNMP application entity that in fact belongs to the SNMP community named by the community component ofsaid message is called an authentic SNMP message. The set of rules by which an SNMP message is identified as an authentic SNMP message for a particular SNMP community is called an authentication scheme. An implementation of a function that identifies authentic SNMPmessages according to one or more authentication schemes is called an authentication service.Clearly, effective management of administrative relationships among SNMP application entities requires authentication services that (by the use of encryption or other techniques) are able to identifyauthentic SNMP messages with a high degree of certainty. Some SNMP implementations may wish to support only a trivial authenticationservice that identifies all SNMP messages as authentic SNMP messages. For any network element, a subset of objects in the MIB that pertain to that element is called a SNMP MIB view. Note that the names ofthe object types represented in a SNMP MIB view need not belong to a Case, Fedor, Schoffstall, & Davin [Page 8]RFC 1157 SNMP May 1990 single sub-tree of the object type name space.An element of the set { READ-ONLY, READ-WRITE } is called an SNMPaccess mode.A pairing of a SNMP access mode with a SNMP MIB view is called anSNMP community profile. A SNMP community profile representsspecified access privileges to variables in a specified MIB view. For every variable in the MIB view in a given SNMP community profile,access to that variable is represented by the profile according tothe following conventions:(1) if said variable is defined in the MIB with "Access:" of"none," it is unavailable as an operand for any operator;(2) if said variable is defined in the MIB with "Access:" of"read-write" or "write-only" and the access mode of thegiven profile is READ-WRITE, that variable is availableas an operand for the get, set, and trap operations;(3) otherwise, the variable is available as an operand forthe get and trap operations.(4) In those cases where a "write-only" variable is anoperand used for the get or trap operations, the valuegiven for the variable is implementation-specific.A pairing of a SNMP community with a SNMP community profile is called a SNMP access policy. An access policy represents a specifiedcommunity profile afforded by the SNMP agent of a specified SNMPcommunity to other members of that community. All administrativerelationships among SNMP application entities are architecturallydefined in terms of SNMP access policies.For every SNMP access policy, if the network element on which theSNMP agent for the specified SNMP community resides is not that towhich the MIB view for the specified profile pertains, then thatpolicy is called a SNMP proxy access policy. The SNMP agentassociated with a proxy access policy is called a SNMP proxy agent. While careless definition of proxy access policies can result inmanagement loops, prudent definition of proxy policies is useful in at least two ways:(1) It permits the monitoring and control of network elementswhich are otherwise not addressable using the managementprotocol and the transport protocol. That is, a proxyagent may provide a protocol conversion function allowinga management station to apply a consistent managementCase, Fedor, Schoffstall, & Davin [Page 9]RFC 1157 SNMP May 1990 framework to all network elements, including devices suchas modems, multiplexors, and other devices which supportdifferent management frameworks.(2) It potentially shields network elements from elaborateaccess control policies. For example, a proxy agent mayimplement sophisticated access control whereby diversesubsets of variables within the MIB are made accessibleto different management stations without increasing thecomplexity of the network element.By way of example, Figure 1 illustrates the relationship betweenmanagement stations, proxy agents, and management agents. In thisexample, the proxy agent is envisioned to be a normal InternetNetwork Operations Center (INOC) of some administrative domain which has a standard managerial relationship with a set of managementagents.Case, Fedor, Schoffstall, & Davin [Page 10]RFC 1157 SNMP May 1990 +------------------+ +----------------+ +----------------+ | Region #1 INOC | |Region #2 INOC | |PC in Region #3 | | | | | | | |Domain=Region #1 | |Domain=Region #2| |Domain=Region #3| |CPU=super-mini-1 | |CPU=super-mini-1| |CPU=Clone-1 | |PCommunity=pub | |PCommunity=pub | |PCommunity=slate| | | | | | | +------------------+ +----------------+ +----------------+ /|\ /|\ /|\| | || | || \|/ || +-----------------+ |+-------------->| Region #3 INOC |<-------------+| ||Domain=Region #3 ||CPU=super-mini-2 ||PCommunity=pub, || slate ||DCommunity=secret|+-------------->| |<-------------+| +-----------------+ || /|\ || | || | |\|/ \|/ \|/+-----------------+ +-----------------+ +-----------------+ |Domain=Region#3 | |Domain=Region#3 | |Domain=Region#3 | |CPU=router-1 | |CPU=mainframe-1 | |CPU=modem-1 | |DCommunity=secret| |DCommunity=secret| |DCommunity=secret| +-----------------+ +-----------------+ +-----------------+ Domain: the administrative domain of the elementPCommunity: the name of a community utilizing a proxy agentDCommunity: the name of a direct communityFigure 1Example Network Management ConfigurationCase, Fedor, Schoffstall, & Davin [Page 11]RFC 1157 SNMP May 1990 3.2.6. Form and Meaning of References to Managed ObjectsThe SMI requires that the definition of a conformant managementprotocol address:(1) the resolution of ambiguous MIB references,(2) the resolution of MIB references in the presence multipleMIB versions, and(3) the identification of particular instances of objecttypes defined in the MIB.3.2.6.1. Resolution of Ambiguous MIB ReferencesBecause the scope of any SNMP operation is conceptually confined to objects relevant to a single network element, and because all SNMPreferences to MIB objects are (implicitly or explicitly) by uniquevariable names, there is no possibility that any SNMP reference toany object type defined in the MIB could resolve to multipleinstances of that type.3.2.6.2. Resolution of References across MIB VersionsThe object instance referred to by any SNMP operation is exactly that specified as part of the operation request or (in the case of a get- next operation) its immediate successor in the MIB as a whole. Inparticular, a reference to an object as part of some version of the Internet-standard MIB does not resolve to any object that is not part of said version of the Internet-standard MIB, except in the case that the requested operation is get-next and the specified object name is lexicographically last among the names of all objects presented aspart of said version of the Internet-Standard MIB.3.2.6.3. Identification of Object InstancesThe names for all object types in the MIB are defined explicitlyeither in the Internet-standard MIB or in other documents whichconform to the naming conventions of the SMI. The SMI requires that conformant management protocols define mechanisms for identifyingindividual instances of those object types for a particular network element.Each instance of any object type defined in the MIB is identified in SNMP operations by a unique name called its "variable name." Ingeneral, the name of an SNMP variable is an OBJECT IDENTIFIER of the form x.y, where x is the name of a non-aggregate object type defined in the MIB and y is an OBJECT IDENTIFIER fragment that, in a way Case, Fedor, Schoffstall, & Davin [Page 12]RFC 1157 SNMP May 1990 specific to the named object type, identifies the desired instance. This naming strategy admits the fullest exploitation of the semantics of the GetNextRequest-PDU (see Section 4), because it assigns names for related variables so as to be contiguous in the lexicographical ordering of all variable names known in the MIB.The type-specific naming of object instances is defined below for a number of classes of object types. Instances of an object type towhich none of the following naming conventions are applicable arenamed by OBJECT IDENTIFIERs of the form x.0, where x is the name of said object type in the MIB definition.For example, suppose one wanted to identify an instance of thevariable sysDescr The object class for sysDescr is:iso org dod internet mgmt mib system sysDescr1 3 6 12 1 1 1Hence, the object type, x, would be 1.3.6.1.2.1.1.1 to which isappended an instance sub-identifier of 0. That is, 1.3.6.1.2.1.1.1.0 identifies the one and only instance of sysDescr.3.2.6.3.1. ifTable Object Type NamesThe name of a subnet interface, s, is the OBJECT IDENTIFIER value of the form i, where i has the value of that instance of the ifIndexobject type associated with s.For each object type, t, for which the defined name, n, has a prefix of ifEntry, an instance, i, of t is named by an OBJECT IDENTIFIER of the form n.s, where s is the name of the subnet interface about which i represents information.For example, suppose one wanted to identify the instance of thevariable ifType associated with interface 2. Accordingly, ifType.2 would identify the desired instance.3.2.6.3.2. atTable Object Type NamesThe name of an AT-cached network address, x, is an OBJECT IDENTIFIER of the form 1.a.b.c.d, where a.b.c.d is the value (in the familiar"dot" notation) of the atNetAddress object type associated with x.The name of an address translation equivalence e is an OBJECTIDENTIFIER value of the form s.w, such that s is the value of thatinstance of the atIndex object type associated with e and such that w is the name of the AT-cached network address associated with e. Case, Fedor, Schoffstall, & Davin [Page 13]RFC 1157 SNMP May 1990 For each object type, t, for which the defined name, n, has a prefix of atEntry, an instance, i, of t is named by an OBJECT IDENTIFIER of the form n.y, where y is the name of the address translationequivalence about which i represents information.For example, suppose one wanted to find the physical address of anentry in the address translation table (ARP cache) associated with an IP address of 89.1.1.42 and interface 3. Accordingly,atPhysAddress.3.1.89.1.1.42 would identify the desired instance.3.2.6.3.3. ipAddrTable Object Type NamesThe name of an IP-addressable network element, x, is the OBJECTIDENTIFIER of the form a.b.c.d such that a.b.c.d is the value (in the familiar "dot" notation) of that instance of the ipAdEntAddr object type associated with x.For each object type, t, for which the defined name, n, has a prefix of ipAddrEntry, an instance, i, of t is named by an OBJECT IDENTIFIER of the form n.y, where y is the name of the IP-addressable networkelement about which i represents information.For example, suppose one wanted to find the network mask of an entry in the IP interface table associated with an IP address of 89.1.1.42. Accordingly, ipAdEntNetMask.89.1.1.42 would identify the desiredinstance.3.2.6.3.4. ipRoutingTable Object Type NamesThe name of an IP route, x, is the OBJECT IDENTIFIER of the forma.b.c.d such that a.b.c.d is the value (in the familiar "dot"notation) of that instance of the ipRouteDest object type associated with x.For each object type, t, for which the defined name, n, has a prefix of ipRoutingEntry, an instance, i, of t is named by an OBJECT。
SmartClass Ethernet测试仪 用户手册
第1章
开始..................................................................................................... 1
装箱清单.............................................................. 2
底部面板介绍.......................................................... 7
启动设备.............................................................. 7
关闭设备.............................................................. 7
不能将此产品作为市政污染废料进行处理,并且根据当地国家相关规则单独收集 处理。在欧盟地区,所有从 JDSU 公司 2005.8.13 日之后购买的设备可以在设 备使用寿命完毕时返回处理。JDSU 公司确保所有返回的废弃设备能够以环境友 好型方式进行重新使用、回收或处理,这些操作都要符合所有国家和国际废料处 理标准。
SmartClass Ethernet 测试仪用户手册
v
目录
第2章 第3章
vi
数据输入屏 ....................................................................................................10 结果屏............................................................................................................10 使用键盘 ............................................................ 11 选择菜单选项或配置设置............................................................................... 11 返回到上一级菜单.......................................................................................... 11 输入数字值 ....................................................................................................11 输入文本 ........................................................................................................11
FUJITSU PRIMERGY RX200 S4 服务器使用说明书
CA92276-8407-01Thank you for purchasing our product. Before you start using your server, please read carefully the additional notes described below.December 2008FUJITSU LIMITED1. Setting for onboard LAN controller on Windows Server 2003 or Windows Server 2003 x64[IMPORTANT]When the server runs on Windows Server 2003 or Windows Server 2003 x64, the onboard LAN controller may not work properly (*) with some applications. To avoid the symptom, make sure to disable the TCP Chimney Offload setting by following the instruction below.1. Start Windows Server 2003 or Windows Server 2003 x64.2. Select [Start] – [Run] and type in "cmd" to activate the command prompt.3. Enter the following command on the command prompt, and press <ENTER>.4.(You do not need to restart the server after this command.)* Example of the cases where the LAN controller does not work properly1) When the data transfer is performed through FTP1-1 "426 Connection Closed; transfer aborted" is displayed.1-2 The FTP connection is disconnected and the data cannot be transferred through FTP .2) When an application that connects to SQL Server by using TCP/IP is used, you may intermittently receive one of the following error messages when the application connects to SQL Server.2-1 [Microsoft] [ODBC SQL Server Driver] [DBNETLIB] General Network errorRefer to the network manuals in this case.2-2 [Microsoft] [SQL Native Client] Communication link failure2-3 System.Data.SqlClient.SqlException: A transport-level error has occurred when sending the request to the server2. Warning Messages of ServerView Remote Connector upon OS startup[Symptom]When all the conditions described later are met, the warning message below may be recorded on the Application Event Log upon the startup of the server.[Conditions]1) ServerView Agent for Windows is installed, and2) The system is highly-loaded during startup.[Cause]The heavy load during the system startup causes the delay in the processing to initializeServerView Remote Connector. This warning message is to report that the service startup isnot completed within the certain period of time, and not that the service startup has failed.[Remedy]Even if the message is recorded due to the delay in the processing to initialize theServerView Remote Connector service, the processing continues. The service isautomatically started after the completion of the initialization, so no special action is required.* The ServerView Remote Connector service is used with the following ServerView functions. Even if this service is not active, no other functions are affected.- Performance Manager- Power MonitorSupplementary Information: How to ConfirmFollow either of the procedures below to confirm whether the ServerView Remote Connector service is running normally.1) When Performance Manager is used-Start the Performance Manager from the ServerView S2.-Select the server for which you want to confirm the ServerView Remote Connector service operation from the left side frame.-Select the [Report View] tab.-Select any report, and click on the [Show >>] button.If the graph is displayed, the ServerView Remote Connector service is running normally and no change is required. When the service is not running normally, the following dialog is displayed.Note: It is necessary to make the report setting beforehand.For the usage of Performance Manager, refer to "ServerView User's Guide".2) When Power Monitor is used-Start the Power Monitor from the ServerView S2.-Select the server for which you want to confirm the ServerView Remote Connector service operation from the left side frame.-Select the [Data] tab.If the graph is displayed, the ServerView Remote Connector service is running normally and no change is required. When the service is not running normally, the following dialogs are displayed.A) The following dialog box is displayed and left open.B) After the dialog in (A), the following window is displayed.Note: For the usage of Power Monitor, refer to "ServerView User's Guide".When the ServerView Remote Connector is not running normally, restart the service by following the procedure below. (There is no need to reboot the system.)[Control Panel] - [Administrative Tools] - [Services] - [ServerView Remote Connector]Select <Restart Service>.3. About the latest ServerViewServerView in "PRIMERGY StartUp Disc" attached to this product does not support BIOS 1.09/iRMC 3.32A.Please download and use ServerView from the following URL when you use BIOS 1.09/iRMC 3.32A./global/services/computing/server/ia/driver/*The number of version of BIOS is displayed in the first line on the POST screen.A part surrounded with a frame is the number of the version of the BIOS.“PhoenixBIOS Version 4.06 Rev. 1.01. 2529”※You could confirm the iRMC firmware version in the following steps.- BIOS SetupTurn on the server and press F2 key to go to BIOS setup window. Then open "Info" window by pressing F1 key to check the iRMC firmware version.example) iRMC Firmware 001.66A4. Updates for "PRIMERGY RX200 S4 User's Guide" (B7FH-5141-01EN)Chapter 4 "4.3 Storing the System Configuration Information" (Page 77)Deletion Delete the incorrect description below.■ Creating "Server Management Tools" disk"Server Management Tools" disk is required to be created when stated as "blank" on the label of the "Server Management Tools" disk, supplied with the server. Create Server Management Tools by referring to "4.4 Creating Maintenance Tools and Driver Disks" (p.82).4.3.1 Storing the BIOS Information and the Remote Management Controller Information (Page 79) Deletion Delete the following notes.The file name is given as "cmosfile" when a file name is not input.4.3.2 Recovering the BIOS / Remote Management Information (Page 79 - 80)Correction There is a misspelling on the command line.4 Enter the following command and press the [Enter] key.Incorrect:A:╲SMT>biosreset.batA:╲SMT>biosrest.batCorrect:the following notes.・ The file name is given as "cmosfile" when a file name is not input."4.3.1Storing the BIOS Information and the Remote Management Controller Information" (Page 78) and"4.3.2 Recovering the BIOS / Remote Management Information" (Page 79)Deletion Delete the incorrect description below."Server Management Tools" disk is required to be created when stated as "blank" on the label of the "Server Management Tools" disk, supplied with the server. Create Server Management Tools by referring to "4.4 Creating Maintenance Tools and Driver Disks" (p.82).Chapter 6 "6.4.2 Installable Memory Modules and Notes" (Page 129)Correction There is an incorrect description under the "How to identify a memory module ".Incorrect:Identification labelCorrect:Addition Add the "Identification label patterns" table below.Identification label patternsWhen a memory module is placed with the circled corner in the above figure shown on the lower left side, the identification labels are applied in one of the following patterns.Table: Identification Label PatternsPattern Label A Label B Label C1 - - -2 Applied - -3 - Applied -4 - -Applied5 AppliedApplied -6 Applied - Applied7 -AppliedApplied8 Applied Applied AppliedChapter 7 "7.2 BIOS setup utility""7.2.8 Advanced System Configuration Submenu" (Page 177~178)Addition Added the setup menu item as bellow.Item Setting DescriptionMemory Throttling ・Disabled(Initial value)・EnabledSetting for memoryMemory Power Mode ・Performance(Initial value)・EnergySetting for power control of memory.High Bandwidth Enabled(unchangeable)Setting for FSB (Front Side Bus).Enhanced Idle Power State Disabled(Initial value)EnabledSetting for power control under OS idlingstate."7.2.10 IPMI Submenu" (Page 180)Correction There are errors in the Setting and the description for "Clear System Event Log".table: Items on the IPMI SubmenuItem Setting DescriptionClear System Event Log ・Disabled(Initial value)・Enabled Sets whether or not to delete the logs stored in the System Event Log (SEL)."7.2.17 Exit Menu" (Page 189)Correction There is an error in the description for "Get Default Vaules".Incorrect: "Local IP address", "Subnet Mask", and "Gateway Address" in the LAN Settingssubmenu are not reset.Correct: All of the submenus in the LAN Settings are not reset.Appendix A Server Specifications (Page 226~229)Correction There is an error in the “table: Server Specifications” , “Supported OS”.(SAS model/SATA model)Correcttable: Server specifications (SAS model)Item Functions and specificationsType DisklessTypeProduct name PRIMERGY RX200 S4 (SAS model) 3.5-inch HardDisk TypePRIMERGY RX200 S4 (SAS model)2.5-inch Hard Disk TypeProduct ID PGUR2041A PGUR204AA PGUR2041A2 PGUR204AA2Chipset Intel®3000Standard Intel® Xeon® Processor E5205(1.86GHz/6MB)Intel® Xeon®Processor L5410(2.33GHz/12MB)Intel® Xeon®Processor E5205(1.86GHz/6MB)Intel® Xeon®Processor L5410(2.33GHz/12MB)Conversion kit/Add-on Intel® Xeon® Processor X5260(3.33GHz/6MB)Intel® Xeon® Processor E5405(2GHz/12MB)Intel® Xeon® Processor E5420(2.50GHz/12MB)Intel® Xeon® Processor X5460(3.16GHz/12MB)Intel® Xeon® Processor X5270(3.50GHz/6MB)Intel® Xeon® Processor X5470(3.33GHz/12MB)Intel® Xeon®ProcessorL5410(2.33GHz/12MB)Intel® Xeon®Processor X5260(3.33GHz/6MB)Intel® Xeon®Processor E5405(2GHz/12MB)Intel® Xeon®Processor E5420(2.50GHz/12MB)Intel® Xeon®Processor X5460(3.16GHz/12MB)Intel® Xeon®ProcessorL5410(2.33GHz/12MB)CPUNumber ofmultiplication1(Max.2)Correcttable: Server specifications (SATA model)Item Functions and specificationsType DisklessType Product name PRIMERGY RX200 S4 (SATA model) 3.5-inch Hard Disk TypeProduct ID PGUR2041B PGUR204ABChipset Intel®3000Standard Intel® Xeon® Processor E5205 (1.86GHz/6MB)Intel® Xeon® Processor L5410(2.33GHz/12MB)Conversion kit/Add-onIntel® Xeon® Processor X5260 (3.33GHz/6MB)Intel® Xeon® Processor E5405 (2GHz/12MB)Intel® Xeon® Processor E5420 (2.50GHz/12MB)Intel® Xeon® Processor X5460 (3.16GHz/12MB)Intel® Xeon® Processor X5270(3.50GHz/6MB)Intel® Xeon® Processor X5470(3.33GHz/12MB)Intel® Xeon® Processor L5410(2.33GHz/12MB)CPUNumber ofmultiplication1(Max.2)Addition Add the “■Supported OS” below.■ Supported OSThe following OSes are supported.• Windows Server 2008 Standard (32-bit)• Windows Server 2008 Standard (64-bit)• Windows Server 2008 Enterprise (32-bit)• Windows Server 2008 Enterprise (64-bit)For details refer to following URL./global/services/computing/server/ia/5.Updates for "PRIMERGY RX200 S4 Configuration Sheets" (CA92276-8032-01)B Configuration Sheets of BIOS Setup Utility Parameters"B.2 Parameters in the Advanced menu / Advance System Configuration Submenu" (Page 11) Addition Added the setup menu item as bellow.Item Initial value Setting Memory Throttling Disabled ( )EnabledMemory Power Mode Performance ( )EnergyHigh Bandwidth Enabled ( )DisabledEnhanced Idle PowerStateDisabled ( )Enabled"B.2 Parameters in the Advanced menu / IPMI Submenu" (Page 12)Correction There is an error in the “Clear System Event Log”. The value of “Clear System Event Log” can bechanged. The initial value of “Clear System Event Log” is “Disabled”.。
sFlow RFC3176
sFlow V ersion 5AbstractThis memo defines 's sFlow system. sFlow is a technology formonitoring traffic in data networks containing switches and routers. In particular, it defines the traffic sampling mechanisms implemented in sFlow Agents, the sFlow MIB for configuring sFlow Agents, and the format of the sFlow Datagram that carries traffic measurement data from sFlow Agents to an sFlow Collector.这备忘录规定's sFlow系统.sFlow是一因为监视含有交换和路由器得数据网络的通讯流量得技术.特别是,它定义在sFlow代理身上执行流量取样机械设备,为配置sFlow代理器sFlow MIB和sFlow Datagram的格式,其一个sFlow搜集器的sFlow代理器带着从流量度量数据的.Table of Contents1. Overview (2)2. Terminology and Architecture (2)2.1 Terminology (2)2.2 sFlow Reference Model (4)3. Sampling Mechanisms (6)3.1 Packet Flow Sampling (6)3.2 Counter Sampling (7)4. sFlow MIB (8)4.1 The SNMP Management Framework (8)4.2 Structure of the sFlow MIB Module (9)4.2.1 The Receiver Group (9)4.2.2 The Flow Sampling Group (9)4.2.3 The Counter Polling Group (10)4.3 Definitions (11)5. sFlow Datagram Format (23)6. Security Considerations (43)6.1 Configuration (44)6.2 Transport (44)6.3 Confidentiality (44)7. References (45)8. Author's Addresses (47)Appendix A:Differences Between sFlow V ersions 1 and 2 (49)Appendix B:Random Number Generation (50)1. OverviewsFlow is a technology for monitoring traffic in data networks containing switches and routers. sFlow是一对含有交换机和路由器的网络流量数据进行得监视技术.The sFlow monitoring system consists of an sFlow Agent (embedded in a switch or router or in a standalone probe) and a central sFlow Collector. The architecture and sampling techniques used in the sFlow monitoring system were designed for providing continuous sitewide (and enterprise-wide) traffic monitoring of high speed switched and routed networks. This design specifically addresses issues associated with:sFlow监视系统由sFlow Agent(嵌入到交换机和路由器或单独的探测器中)和central sFlow Collector.使用在sFlow监视器系统的结构和采样技术都有计划的提供连续的网点范围(企业范围)的高速的交换和路由的网络工作的流量监视.o Accurately monitoring network traffic at Gigabit speeds and higher.准确得监视Gigabit速度及更高流量网络o Scaling to monitor tens of thousands of agents from a single sFlow Collector.依比例决定从单独得一个sFlow搜集器监视数以万计的代理器的.o Extremely low cost sFlow Agent implementation. 极其低价钱为sFlow代理工具The sFlow Agent uses sampling technology to capture traffic statistics from the device it is monitoring. sFlow Datagrams are used to immediately forward the sampled traffic statistics to an sFlow Collector for analysis.sFlow代理器使用取样技术捕获从它监视设备中进行流量统计.使用sFlow Datagrams为分析立即转发抽样检查流量统计给一个sFlow搜集器.This document describes the sampling mechanisms used by the sFlow Agent, the SFLOW MIB used by the sFlow Collector to control the sFlow Agent, and the sFlow Datagram Format used by the sFlow Agent to send traffic data to the sFlow Collector.这文件描绘经过sFlow代理器使用取样机制,SFLOW MIB经过sFlow搜集器通常控制sFlow 代理器,和sFlow Datagram格式经过sFlow代理器通常把流量数据寄给sFlow搜集器.This memo describes sFlow version 5. It replaces sFlow version 4 described in RFC 3176 [1]. The differences between sFlow versions 4 and 5 are described in Appendix A.这备忘录描绘sFlow版本5.它取代在RFC 3176[1]中描绘sFlow第4版.sFlow第4和5版之间的差异在附录A中被描绘.2. Terminology and ArchitectureThis section defines the elements of the sFlow system.这部分解释sFlow系统的基本原理2.1 TerminologyThe terms used to specify the sFlow architecture are defined here for reference.这些条款作为使用sFlow体系结构的参考.o Network Device:A piece of network equipment, such as a switch or router, that forwards data packets.网络设备:一台像交换器、路由器这样的转发数据包的网络设备o Data Source:A Data Source refers to a location within a Network Device that can make traffic measurements. Possible Data Sources include interfaces, physical entities within the device such as the backplane and VLANs. Each Data Source has access to a subset of the traffic flowing through the device. The type and number of Data Sources needed to completely monitor a device will depend on the internal architecture of that device. Typically a Data Source is defined for each physical interface on the device since this ensures that every packet transiting the device to be observed.数据源:在一定位置上能够产生流量检测的网络设备.可能数据源包括接口、在例如像backplane和VLANs这样的设备上的物理实体.每个数据源能够访问到通过设备数据流量的子集.一些类型和数量的数据源需要完整的监视设备将依赖设备的内部结构体系.典型的数据源为定义了每个设备上的物理接口以确保每个通过传输的包的观察设备o Packet Flow:A Packet Flow is defined as the path or trajectory that a packet takes througha Network Device (i.e. the path that a packet takes as it is received on one interface, is subject to a switching/routing decision and is then sent on another interface. In the case of a one-armed router, the source and destination interface could be the same. In the case of a broadcast or multicast packet there may be multiple destination interfaces).信息包流:定义为包通过网络设备的路径或轨迹(例如一个接口接受包,并由路由器或交换机决定是否发送给另外的接口的路径.在one_arm路由器的情况下,源和目的路由接口应当一样.在广播或多播包的情况下,这将多目的接口)o Packet Flow Sampling:Packet Flow Sampling refers to the random selection of a fraction of the Packet Flows observed at a Data Source.包流采样:在数据源上随机选择部分用来观察的包流.o Sampling Rate:The Sampling Rate specifies the ratio of packets observed at the Data Source to the samples generated. For example a sampling rate of 100 specifies that, on average, 1 sample will be generated for every 100 packets observed.采样率:采样包和观察源数据的比率.例如抽样率为100,那么平均从100个要观察的包中抽取1个包o Packet Flow Record:A Packet Flow Record describes the attributes of a Packet Flow. There are two types of information in a flow record:1 Information on the packet itself, typically a packet header, packet length and packet encapsulation.2 Information about the path the packet took through the device, including information relating to the selection of the forwarding path.包流记录:它描述了一个包流的特征.这里有2个信息在包流记录中:(1)包自己的信息,代表的有包头,包长度和包封装(2)关于包通过设备的路径信息,包含了相关的选择前向路径o Counter Sampling:Periodic sampling or polling of counters associated with a Data Source. 采样计数器:数据源关联的周期取样或者投票的计数器.o Sampling Interval:The time period between successive Counter Samples.取样时间间隔:连续计数采样之间的时间周期.o Counter Record:A record containing counter values associated with a Data Source at the end of a Sampling Interval.计数器记录:包含在采样周期结尾的与数据源关联的计数值的记录o sFlow Instance:An sFlow Instance refers to a measurement process associated with a Data Source.There may be one or more sFlow Instances associated with a single Data Source.Each sFlow Instance operates independently of other sFlow Instances, for example if Packet Flow Sampling instances each have their own Sampling Rates and Counter Sampling instaces have their own Sampling Interval.sFlow实例:与数据源关联的测量处理.可以提供一个或多个sFlow实例关联在一个数据源上.每个sFlow 实例独立于其他的sFlow 实例,例如,每个包采样实例都有他们自己的采样率和采样计数器在他们自己的采样周期中o sFlow Agent:The sFlow Agent provides an interface for configuring the sFlow Instances within a device. The sFlow Agent may support command line and/or SNMP based configuration.The agent is also responsible for maintaining measurement sessions with sFlow Collectors. It marshals data into sFlow Datagrams to send to sFlow Collectors. The sFlow Agent frees resources when a session expires.sFlow代理器:给设备中的sFlow实例的配置提供接口,它提供基于命令行或基于SNMP配置.它还负责对sFlow搜集器的维修测量对话.它整理数据到sFlow Datagram 发送到sFlow搜集器.sFlow代理在对话过期后释放资源.o sFlow Sub-Agent:In the case where sFlow is implemented on a distributed device architecture it may be desireable to distribute the sFlow Agent functionality. Each sFlow Sub-Agent is responsible for a particular subset of Data Sources.sFlow子代理器:在sFlow在分布结构设备上执行情况下可以是描述sFlow代理器的性能的愿望其sFlow有关一分配设备体系结构被执行.每一sFlow子代理依赖于数据源的特殊子集.o sFlow Collector:An sFlow Collector receives sFlow Datagrams from one or more sFlow Agents. The sFlow Collector may also configure sFlow Instances using the configuration mechanisms provided by the sFlow Agent.sFlow搜集器:一个sFlow搜集器从一个或更多sFlow代理器收到sFlow Datagrams.sFlow搜集器可以也配置sFlow实例使用经过sFlow代理器提供配置机械设备.o sFlow Datagram:The sFlow Datagram is a UDP datagram that contains the measurement data, and information about the measurement source and process. The format of the sFlow Datagram is defined in this document.sFlowDatagram:sFlow Datagram是一UDP datagram,其含有度量数据和关于度量来源和过程的信息的.sFlow Datagram的格式在这文件中被确定.2.2 sFlow Reference ModelThe figure below shows the relationships between the different entities within an sFlow system.下面图示展示了一sFlow系统内不同实体之间的关系.An sFlow Collector makes use of SNMP to communicate with an sFlow Agent in order toconfigure sFlow monitoring on a Network Device. The sFlow MIB describes the managed objects needed to configure an sFlow Agent. Packet Flow Sampling and Counter Sampling is performed by sFlow Instances associated with individual Data Sources within the sFlow Agent. In order to perform Packet Flow Sampling, an sFlow Instance is configured with a Sampling Rate. The Packet Flow sampling process results in the generation of Packet Flow Records. In order to perform Counter Sampling, an sFlow Instance is configured with a Sampling Interval. The Counter Sampling process results in the generation of Counter Records. The sFlow Agent collects Counter Records and Packet Flow Records and sends them in the form of sFlow Datagrams to sFlow Collectors.SFlow 搜集器为了配置sFlow 监视网络设备使用SNMP与sFlow 代理通讯. SFlow MIB 描述管理目标需要配置在sFlow Agent.包采样和计数采样在sFlow 代理上的一个个体数据源上的sFlow实例来执行.为了执行包流采样,要配置sFlow实例的采样率.包流采样处理结果由包流记录产生.为了执行计数器采样,sFlow实例配置采样间隔.计数器采样处理结果由计数器记录产生.sFlow代理搜集计数器记录和包流记录并以sFlow数据报形式发送他们到sFlow搜集器.3. Sampling MechanismsThe sFlow Agent uses two forms of sampling:statistical packet-based sampling of switched or routed Packet Flows, and time-based sampling of counters.sFlow代理用2种格式采样:基于包统计交换或路由包流的采样;基于时间和计数器的采样3.1 Packet Flow SamplingThe Packet Flow Sampling mechanism carried out by each sFlow Instance must ensure that any packet observed at a Data Source has an equal chance of being sampled, irrespective of the Packet Flow(s) to which it belongs.包流采样机制是由每个sFlow实例必须确认观察数据源上的任何包有平等的机会被抽样到.不考虑包流属于谁.Packet Flow Sampling is accomplished as follows:When a packet arrives on an interface, the Network Device makes a filtering decision to determines whether the packet should be dropped. If the packet is not filtered a destination interface is assigned by the switching/routing function. At this point a decision is made on whether or not to sample the packet. The mechanism involves a counter that is decremented with each packet.When the counter reaches zero a sample is taken. Whether or not a sample is taken, the counter Total_Packets is incremented.Total_Packets is a count of all the packets that could have been sampled.执行流程:当一个包到达接口,网络设备作出是否丢弃它的过滤.如果包没有被交换或路由功能过滤掉一个目的接口.在这指出决定是否采样包.这个机制包括计数器对每一个包递减.当计数器到到0,一个采样就产生.无论采样是否发生,计数器Total_Packts增加.Total_Packets是计算所有被采样的包数量Taking a sample involves either copying the packet's header, or extracting features from the packet.See sFlow Datagram Format for a description of the different forms of sample.Every time a sample is taken, the counter Total_Samples, is incremented. Total_Samples is a count of the number of samples generated.Samples are sent by the sFlow Instance to the sFlow Agent for processing.The sample includes the packet information, and the values of the Total_Packets and Total_Samples counters.The sFlow Agent may then use the samples to obtain additionalinformation about the packet's trajectory through the device. Such information depends on the forwarding functions of the device. Examples of trajectory information provided are source and destination interface, source and destination VLAN, next hop subnet, full AS path. Details of the forwarding information are given in the sFlow Datagram Format.包采样包括拷贝包的头或从包中提取特征.(看描述不同采样格式的sFlow数据报格式).每次采样,计数器Total_samples都增加.Total_samples是统计采样发生数量的.采样发送到sFlow 代理的sFlow实例处理. 采样包括包信息和Total_Packets和Total_samples计数器.SFlow代理要用采样获得关于包通过设备路径的的另外信息.一些信息依赖设备的转发功能.路径信息的例子提供源和目的接口,源和目的VLAN,子网下一跳,全AS-path.详细的转发信息付给sFlow 数据报格式When a sample is taken, the counter indicating how many packets to skip before taking the next sample should be reset. The value of the counter should be set to a random integer where the sequence of random integers used over time should be such that:当采样发生,计数器指示出下一次采样发生前有多少个包跳过,计数器的值被设为随机的一个int型数,(1) Total_Packets/Total_Samples = Sampling RateAn alternative strategy for Packet Flow Sampling is to generate a random number for each packet, compare the random number to a preset threshold and take a sample whenever the random number is smaller than the threshold value. Calculation of an appropriate threshold value depends on the characteristics of the random number generator, however, the resulting sample stream must still satisfy包流采样的选择策略是每个包产生一个随机数,比较随机数和提前设定的阈值,如果小于阈值就采样.计算一个合适的阈值依赖于特定的随机数产生器,但是,随之发生采样结果必须去更加完善.Appendix B further discusses the requirements for the random number generator.附录B进一步讨论随机数产生的要求.3.2 Counter SamplingThe primary objective of the Counter Sampling is to efficiently, periodically export counters associated with Data Sources.计数器取样的基本目标是要高效的、周期性地输出把计数器和数据源联系起来.Typically a Data Source will be associated with each interface on the device that can be an ingress or egress interface for Packet Flows.These interface Data Sources will then be used to export counters relating to the interfaces.典型一数据源将被把和每一在能是一进入的设备上接口联系起来或者那时为包Flows.这些数据源接口将被使用出口数据.A maximum Sampling Interval is assigned to each sFlow Instance associated with an interface Data Source, but the sFlow Agent is free to schedule polling in order maximize internal efficiency. 给分配一最大取样时间间隔但是sFlow代理器是对顺序投票明细表自由使内部效率增至最大每一sFlow实例把和联系起来一接口数据源.Packet Flow Sampling and Counter Sampling are designed as part of an integrated system. Both types of sample are combined in sFlow Datagrams. Since Packet Flow Sampling will cause a steady, but random, stream of sFlow Datagrams to be sent to the sFlow Collector, counter samples may be taken opportunistically in order to fill these datagrams.包流动取样和计数器取样作为一综合系统的一部分被设计.两个类型的样品在sFlow Datagrams中被合并.自包流动取样将给一固定的异性朋友但是任意行动造成以来,为了填补这些,计数器样品可以机会主义地被拿datagrams股sFlow Datagrams把寄给sFlow搜集器.One strategy for counter sampling has the sFlow Agent keep a list of counter sources being sampled. When a Packet Flow Sample is generated the sFlow Agent examines the list and adds counters to the sample datagram, least recently sampled first. Counters are only added to the datagram if the sources are within a short period, 5 seconds say, of failing to meet the required Sampling Interval (see sFlowCounterSamplingInterval in SFLOW MIB). Whenever a counter source's statistics are added to a sample datagram, the time the counter source was last sampled is updated and the counter source is placed at the end of the list. Periodically, say every sec ond, the sFlow Agent examines the list of counter sources and sends any counters that need to be sent to meet the sampling interval requirement.一计数器取样的对策让一计数器来源的清单继续是抽样检查让sFlow代理器.当一包流动样品是产生的时候,sFlow代理器检查清单和添加和样品datagram相反最不近来首先抽样检查.5次品谈到未能遭遇需要取样时间间隔(在SFLOW MIB中看见sFlowCounterSamplingInter)说如果在一短时期以内,来源是,计数器仅被被加入datagram.每当一计数器来源的统计被被加入一样品datagram,计数器来源最后被抽样检查时间被更新在清单的末端和计数器来源被安置.周期性地,比如说每隔一sFlow代理器检查计数器来源的清单和寄送任何应该是的计数器寄送符合取样时间间隔要求If the sFlow Agent chooses to regularly schedule counter sampling, then it should schedule each counter source at a different start time (preferably randomly) so that counter sampling is not synchronised within an agent or between agents.如果sFlow代理器宁愿选择正常计划计数器取样,然后在不同出发时刻它应该计划每一计数器来源,(更可取地任意行动地)因此计数器取样在一个代理器心里或者在代理器之间不是synchronised.4. sFlow MIBThe sFlow MIB provides a standard mechanism for remotely controlling and configuring an sFlow Agent.sFlow MIB为远离控制和配置sFlow代理器提供一个标准机制.4.1 The SNMP Management Framework (SNMP管理框架)The SNMP Management Framework presently consists of five major components:SNMP管理框架不久由五个主要成分构成:o An overall architecture, described in RFC 2571 [2].在RFC 2571[2]中描绘一总体系结构.o Mechanisms for describing and naming objects and events for the purpose of management. The first version of this Structure of Management Information (SMI) is called SMIv1 and described in STD 16, RFC 1155 [3], STD 16, RFC 1212 [4] and RFC 1215 [5]. The second version, called SMIv2, is described in STD 58, RFC 2578 [6], STD58, RFC 2579 [7] and STD 58, RFC 2580 [8].机制描绘和目标命名及事件是为了实现管理.管理信息(SMI)的结构的第一版本被称为SMIv1是在STD 16,RFC 1155[3],STD 16,RFC 1212[4]和RFC 1215[5]中描绘.第二版本是在SMIv2在STD 58,RFC 2578[6],STD58,RFC 2579[7]和STD 58,RFC 2580[8]中被描绘.o Message protocols for transferring management information. The first version of the SNMP message protocol is called SNMPv1 and described in STD 15, RFC 1157 [9]. A second version ofthe SNMP message protocol, which is not an Internet standards track protocol, is called SNMPv2c and described in RFC 1901 [10] and RFC 1906[11]. The third version of the message protocol is called SNMPv3 and described in RFC 1906 [11], RFC 2572 [12] and RFC 2574 [13].因为搬管理知识o信息礼仪.SNMP信息礼仪的第一版本被认为是SNMPv1和在STD中描绘15,RFC 1157[9].认为是SNMPv2c在RFC 1901[10]和RFC 1906[11]中被和描绘一SNMP信息礼仪的第二版本,其不是一因特网标准轨迹礼仪的.认为是SNMPv3在RFC 1906[11],RFC 2572[12]和RFC 2574[13]中被和描绘信息礼仪的第三版本.o Protocol operations for accessing management information.The first set of protocol operations and associated PDU formats is described in STD 15, RFC 1157 [9]. A second set of protocol operations and associated PDU formats is described in RFC 1905 [14].information.第一为访问管理准备礼仪运算和结合PDU格式的o礼仪运算的在STD 15,RFC 1157[9]中被描绘.一第二套礼仪运算和结合PDU格式在RFC 1905[14]中被描绘.o A set of fundamental applications described in RFC 2573 [15] and the view-based access control mechanism described in RFC 2575 [16].o A套基本应用在RFC中描绘2573[15]和基于视野的接近的机会控制手段机械设备在RFC 中描绘2575[16].A more detailed introduction to the current SNMP Management Framework can be found in RFC 2570 [17].一更详细对当前SNMP管理框架的介绍能在RFC 2570[17]中被找出.Managed objects are accessed via a virtual information store, termed the Management Information Base or MIB. Objects in the MIB are defined using the mechanisms defined in the SMI.经由一个事实上信息存储被接近把管理目标称为管理信息基础或者MIB.在MIB中目标被规定使用在SMI中定义机械设备.This memo specifies a MIB module that is compliant to the SMIv2. A MIB conforming to the SMIv1 can be produced through the appropriate translations.The resulting translated MIB must be semantically equivalent, except where objects or events are omitted because no translation is possible (use of Counter64). Some machine readable information in SMIv2 will be converted into textual descriptions in SMIv1 during the translation process. However, this loss of machine readable information is not considered to change the semantics of the MIB.这备忘录对SMIv2顺从指定一是的MIB模数.一MIB遵从SMIv1能被生产通过适合translations.The随之发生翻译MIB一定是按语义地等于,因为没有翻译是可能,除了什么地方物件或者事件是删掉Counter64的使用.一些在SMIv2中机器可读信息将在翻译过程期间被把变成在SMIv1中原文的描绘.但是,不认为这机器可读信息的失败改变MIB的语义学.4.2 Structure of the SFLOW MIB Module(SFLOW MIB模数的结构)The MIB consists of three groups of objects:the receiver group, the flow sampling group and the counter polling group.MIB由三群物件构成:接受组,流动取样组和投票计数器组在一起.4.2.1 The Receiver GroupThe receiver group defines the set of objects used to maintain an sFlow session between an sFlow Agent and an sFlow Collector.接受组定义使用目标集在sFlow代理器和sFlow搜集器之间保持一个sFlow session.Before making any configuration changes, an sFlow Collector must first find a free row in the receiver table and then claim it by writing its owner string and a reservation time into a free row in the receiver table. A session will automatically time out, and the associated resources freed, unless it is periodically refreshed by the the collector. By periodically refreshing its receiver table entry, an sFlow Collector ensures that its address is learned by any bridges on the path to the sFlow Agent, minimizing the chances that the sFlow Datagrams will be flooded by a bridge.在有任何配置改变之前,一个sFlow搜集器首先必须在接受表中找出一个自由表然后通过写他自己的字符串何预定时间值声明它,一个session将自动time out,互联资源自动释放,除非搜集器会周期性的刷新.通过周期性地刷新它的接受表入口,一个sFlow搜集器保证它的地址被任何在通向sFlow代理器的路径上的网桥学习到,极小改变sFlow Datagrams将使网桥溢出.Entries cannot be added to or removed from the receiver group table. An sFlow Agent implementor should limit the number of entries to ensure that the number of concurrent sFlow sessions is limited to a number that will not exceed that capacity of the device.接受组表不能添加或删除条目.一个sFlow代理器使用工具者应该限制入口的数目,保证其限制同时发生的sFlow sessions的数目为一数那个将不超过那设备的容量的.Having acquired a row in the receiver table, the sFlow Collector specifies an address and port that it will use to receive sFlow Datagrams. The maximum size of sFlow Datagrams can be configured in order to prevent packet fragmentation.在已获得接受表的row中,sFlow搜集器指定一地址和port来接受sFlow Datagrams.为了防止分包, 要配置sFlow Datagrams的最大值.4.2.2 The Flow Sampling GroupThe flow sampling group defines a set of locations, or Data Sources, in the device that are capable of Packet Flow sampling.Data Sources may correspond to interfaces, VLANs or other entities within the device. The set of Data Sources advertised by an sFlow Agent depends on the device architecture. For example, a device may have packet sampling integrated into its interface ASICs, in which case it will advertise Data Sources for each interface. Alternatively, a software router may simply have one Data Source associated with the routing module.包流取样组定义一组可能做出包流取样的位置或数据源的集合.数据源对应于设备interfaces、VLANs或者其它实体.sFlow代理器为数据源集做广播取决于设备体系结构.例如,一设备可以有把包完整取样到它的接口ASICs,在这种情况下它将为每一接口为数据源登广播的.另一种选择,一个软件路由可以简单用路由模式联系一数据源.Each Data Source may be capable of supporting more than one independent sampling process, in which case there will be multiple sFlow Instances associated with each Data Source. Each sFlow Instance can have its own independent sampling rate.每一数据源可以是能支持一或多独立取样处理,在这种情况下将有把多重sFlow实例和每一数据源联系起来的.每一sFlow实例能有它的自己独立的抽样速率.Even if the Data Source hardware is only capable of generating a single stream of packet samples, it is possible for the sFlow Agent to use sub-sampling to create multiple sFlow Instances for the Data Source. For example, suppose there are two sFlow Instances, one configured with a Sampling Rate of 512 and the other with a rate of 1024. The hardware can be configured to sample at a rate of 512 and then these samples can be sub-sampled in software using a sampling rate of 2 to achieve the 1024 rate. Only allowing Sampling Rates that are powers of two is attractive since it allows the smallest configured Sampling Rate to be set in hardware and all other sampling ratescan be obtained in software by sub-sampling.即使数据源硬件是仅仅能产生一单一的包样品,sFlow代理器使用子取样为数据源建立多重sFlow实例是可能的.例如,假定有两sFlow实例,一个取样以512的速率配置,其他的以1024配置.硬件能被配置在一512的速度方面试样后显示结果然后能是子在软件中取这些样品的样品使用一2的取样速度取得1024速度自它允许被把最小配置取样嵌入硬件速度和所有的其它取样速度能在软件中被亚取样得到以来,仅允许抽样检查是二的力量的速度是有吸引力.An Flow Sampling Instance may have a minimum allowable Sampling Rate.Setting a conservative value that ensures that the sFlow Agent can never become overloaded with Packet Flow Samples under worst case traffic loads is not advisable. This yeilds minimum Sampling Rate values that are very high and don't reflect typical traffic levels. The Agent may implement an automated one-way backoff of the Sampling Rate that triggers whenever an excessive number of samples per second is generated. When the triggered the Agent can double the Sampling Rate. If the threshold is exceeded again, the Sampling Rate is doubled again. The Sampling Rate will quickly reach a value that is sustainable. The sampling rate must stay at its new value and never automatically return to the originally configured value. The value may be changed back manually through the command line interface or via the sFlow MIB. This scheme protects against poorly chosen Sampling Rates or unexpected changes in peak traffic rates, but still allows low Sampling Rates to be safely selected where appropriate.一流取样实例可以让一最低限度容许抽样检查Rate.Setting一保守价值不是明智,其保证能从不变得用在糟情况流量负担下包流动样品使sFlow代理器超载的.这yeilds最低限度瞄准,抽样检查速度价值观,其是非常高和不反映出典型流量的.代理器可以执行一取样速度的自动化单向的backoff,扳机产生,究竟什么时候一过分每秒样品的数目是的.什么时候松开扳柄代理器能把取样速度增加一倍.如果门槛再次被超过,再次把取样速度增加一倍.取样速度将迅速达到一是支撑得住的价值.取样速度必须在它的新价值方面留下和从不自动返回原来配置价值.价值可以回来通过指挥线接口或者经由sFlow MIB手工被改变.这计划避免身体不舒服的选择取样速度或者意想不到高峰流量速度的改变的危害但是仍然允许低样品安全适合的地方,被选择速度.4.2.3 The Counter Polling GroupThe counter polling group defines a set of locations, or Data Sources, in the device that can provide counter information. Typically the Data Sources will be the interfaces on the device. Each Data Source may be capable of supporting more than one independent polling process, in which case there will be multiple counter polling instances associated with each data source. Each counter polling instance can have its own independent polling interval.它定义一组在能提供计数器信息的设备中位置或者数据源.典型数据源将是在设备上接口.每一数据源可以是能支持一个或多个独立投票处理,在这种情况下将有多重计数器获得把情况和每一数据源联系起来的.每一计数器能独立的时间间隔投票.4.3 DefinitionsSFLOW-MIB DEFINITIONS ::= BEGINIMPORTSMODULE-IDENTITY, OBJECT-TYPE, Integer32, enterprisesFROM SNMPv2-SMITEXTUAL-CONVENTIONFROM SNMPv2-TCSnmpAdminStringFROM SNMP-FRAMEWORK-MIBOwnerStringFROM RMON-MIBInetAddressType, InetAddressFROM INET-ADDRESS-MIBMODULE-COMPLIANCE, OBJECT-GROUPFROM SNMPv2-CONF;sFlowMIB MODULE-IDENTITYLAST-UPDA TED "200309240000Z" -- September 24, 2003 ORGANIZA TION ""CONTACT-INFO"Peter Phaalhttp:///Tel:+1-415-283-3260Email:peter.phaal@"DESCRIPTION"The MIB module for managing the generation and transportationof sFlow data records."---- Revision History--REVISION "200310180000Z" -- November 18, 2003 DESCRIPTION"V ersion 1.3 (draft 5)Allow set to SFlowReceiver if it doesn't changevalue."REVISION "200309240000Z" -- September 24, 2003 DESCRIPTION"V ersion 1.3 (draft 4)Default value of sFlowRcvrAddress should be '00000000' h.Default value of sFlowCpReceiver should be 0."REVISION "200304080000Z" -- April 8, 2003 DESCRIPTION"V ersion 1.3 (draft 3)Clarify semantics of counter polling interval,sFlowCpInterval."REVISION "200209170000Z" -- September 17, 2002DESCRIPTION"V ersion 1.3 (draft 2)Adds support for multiple sFlow samplers per sFlowDataSource. Moved to enterprise number.Splits flow sampling,counter polling and receiver specification into separate tables."添加支持为每sFlowDataSource多重sFlow取样员.去企业提议number.Splits流动取样,投票计数器和进入独立表收件规格说明.REVISION "200107310000Z" -- July 31, 2001DESCRIPTION"V ersion 1.2Brings MIB into SMI v2 compliance."REVISION "200105010000Z" -- May 1, 2001DESCRIPTION"V ersion 1.1Adds sfDatagramV ersion."::= { enterprises sflow(14706) 1 }sFlowAgent OBJECT IDENTIFIER ::= { sFlowMIB 1 }SFlowDataSource ::= TEXTUAL-CONVENTIONSTA TUS currentDESCRIPTION"Identifies a source of sFlow data.The following data source types are currently defined:- ifIndex.<I>SFlowDataSources of this traditional form are called 'port-based'. Ideally the sampling entity will perform sampling on all flows originating from or destined to the specified interface. However, if the switch architecture only allows input or output sampling then the sampling agent is permitted to only sample input flows input or output flows. Each packet must only be considered once for sampling, irrespective of the number of ports it will be forwarded to. Note:Port 0 is used to indicate that all ports on the device are represented by a single data source. - sFlowFsPacketSamplingRate applies to all ports on the device capable of packet sampling.- smonVlanDataSource.<V>An SFlowDataSource of this form refers to a 'Packet-based VLAN'and is called a 'VLAN-based' dataSource. <V> is the VLANID as defined by the IEEE 802.1Q standard. Thevalue is between 1 and 4094 inclusive, and it representsan 802.1Q VLAN-ID with global scope within a givenbridged domain.Sampling is performed on all packets received that are partof the specified VLAN (no matter which port they arrived on).Each packet will only be considered once for sampling,irrespective of the number of ports it will be forwarded to.- entPhysicalEntry.<N>An SFlowDataSource of this form refers to a physical entitywithin the agent (e.g. entPhysicalClass = backplane(4)) andis called an 'entity-based' dataSource. Sampling is performedon all packets entering the resource (e.g. If the backplaneis being sampled, all packets transmitted onto the backplanewill be considered as single candidates for samplingirrespective of the number of ports they ultimately reach).Note:Since each SFlowDataSource operates independently apacket that crosses multiple DataSources may generatemultiple flow records."SYNTAX OBJECT IDENTIFIERSFlowInstance ::= TEXTUAL-CONVENTIONSTA TUS currentDESCRIPTION"If more than one sFlow sampler is available for thisSFlowDataSource then individual samplers are distinguishedusing the SFlowInstance variable. The value ofSFlowInstance ranges from 1..n where n is the number ofsamplers associated with this SFlowDataSource.Note:Each sFlow sampler instance must operateindependently of all other instances. Settingan attribute of one sampler must not alter thethe behavior and settings of other samplerinstances."SYNTAX Integer32 (1..65535)SFlowReceiver ::= TEXTUAL-CONVENTIONSTA TUS currentDESCRIPTION"Identify the sFlow receiver associated with this resource.A value of zero indicates that this resource is available.。
数据库连接泄漏与资源占用的检测与解决方法
数据库连接泄漏与资源占用的检测与解决方法当开发人员在编写应用程序时,常常需要与数据库进行连接和交互。
然而,如果数据库连接没有正确地关闭,就会导致数据库连接泄漏和资源占用的问题。
本文将介绍数据库连接泄漏的原因、检测方法以及解决方法,以帮助开发人员避免潜在的问题。
首先,我们需要了解数据库连接泄漏的原因。
数据库连接泄漏通常发生在以下场景中:1. 未正确关闭数据库连接:在开发过程中,开发人员负责手动打开和关闭数据库连接。
如果连接未正确关闭,它将保留在连接池中而不被释放,导致泄漏。
2. 异常情况:在应用程序中发生异常时,连接未能得到正确关闭。
例如,当代码中发生异常而没有执行到关闭连接的代码块时,连接就会泄漏。
3. 长时间执行的事务:如果一个事务持续执行而不被提交或回滚,它将占用连接资源。
如果这种情况发生在多个连接上,会导致资源的快速耗尽。
接下来,我们将介绍数据库连接泄漏的检测方法。
主要的检测方法包括:1. 监控数据库连接池:监控数据库连接池中的连接数量和占用资源的情况,可以通过数据库管理工具或代码来实现。
如果连接数量异常增加或资源占用超过预设阈值,可能存在连接泄漏的问题。
2. 日志记录:在应用程序中记录打开和关闭数据库连接的日志。
通过分析日志文件,可以检测哪些连接没有被正确关闭。
3. 连接超时:设置连接的超时时间,在规定时间内没有被正确关闭的连接将被关闭。
这样可以减少连接泄漏的影响。
现在,我们将讨论解决数据库连接泄漏和资源占用的方法。
以下是一些常用的解决方法:1. 使用连接池技术:使用连接池可以有效地管理数据库连接,并且可以自动回收闲置的连接。
连接池可以避免手动打开和关闭连接,从而减少连接泄漏的风险。
2. 编写可靠的异常处理代码:在代码中使用try-catch块来捕获异常,并确保在异常发生时正确关闭连接。
这可以避免由于异常而导致的连接泄漏问题。
3. 及时提交或回滚事务:确保长时间执行的事务在合适的时机提交或回滚。
网络协议RFC文档版本号
1.表格表1 协议列表说明:●Vxworks中网络协议基本与4.4BSD网络兼容,但增强了实时性和某些特性。
●Vxworks支持的网络协议如下,但并没有指明版本号:应用层:NFS FTP TFTP DHCP SNTP TELNET MIB-II HTTP;传输层:TCP UDP;网络层:IP IP多播CIDR RIP OSPF ICMP ARP IGMP;链路层:Ethernet PPP SLIP CSLIP。
各个版本之间差别不是很大,基本的功能都是相同的。
2.各个网络协议的部分RFC标准RFC1122, 标准RFC3168, RFC6093, RFC6528均为建议标准RFC2228, RFC2640, 建议标准RFC2773, 实验性EXPERIMENTALRFC3659, RFC5797建议标准RFC1782, RFC1783, RFC1784, 建议标准RFC1785, INFORMATIONALRFC2347, RFC2348, RFC2349DRAFT STANDARDRFC1349建议标准RFC950, 标准协议RFC4884建议标准RFC5227, RFC5494建议标准RFC1957, international RFC2449, RFC6186建议标准RFC5506, RFC5761, RFC6051, RFC6222建议标准(14)RSTPRFC3265, RFC3853, RFC4320, RFC4916,RFC5393, RFC5621, RFC5626, RFC5630 , RFC5922, RFC5954, RFC6026, RFC6141建议标准RFC4822HTTPS不应与在RFC 2660中定义的安全超文本传输协议(S-HTTP)相混RFC5785建议标准。
RFC逻辑定律
RFC逻辑定律SAP 高级应用开发 - RFCRFC Remote function Call 远程功能调用, 是SAP系统之间以及非SAP系统之间程序通信的基本接口技术. 例如BAPI , ALE都是基于RFC实现的RFC连接类型:1.类型2: R/2连接2.类型3: ABAP连接或R/3连接,指定主机名和通信服务3.类型I:内部连接,与当前系统连接到同一ABAP系统中,预定义无法修改,与SM51中所显示的应用服务器名相同4.类型L:逻辑目标,通常工作流系统指定过程中配置的RFC目标即为该类型的逻辑目标5.类型X:指定安装了特殊的ABAP设备驱动程序的系统,必须制定ABAP设备驱动程序名6.类型S:通过SNA或APPC启动的外部程序连接7.类型M:通过CMC到ABAP系统的异步RFC连接8.类型T:通过TCP/IP并使用RFC库或SAP连接器的外部程序连接;分为启动(指定主机名、程序路径名)和注册(RFC服务器程序)两种连接模式。
9.类型G:定义外部系统到本地HTTP连接10.类型H:定义ABAP系统到本地的HTTP连接远程调用RFM:1.远程目标可以是文字或变量,其值为SAP系统中一直的远程目标系统。
2.若远程系统是当前系统中的SAP应用服务器,也可以直接指定应用服务器名称,则SM59中的I类型目标3.SM59定义的RFC目标是区分大小写的。
DESTINATION附加项中目标变量的值必须与其完全一致通过CALL FUNCTION语句进行远程功能调用时,可形成不同的调用模式:1. CALL FUNCTION DESTINATION 以同步RFC方式实现RFM 调用,若后面无其他附加项,则形成同步RFC调用,调用程序等待远程调用结果以继续执行2. CALL FUNCTION STARTING NEW TASK 以异步RFC方式实现RFM调用,调用程序不等待远程调用结果继续执行,结果将在回调子程序(callback subroutine)中接收3. CALL FUNCTION IN BACKROUND TASK 以事务性RFC方式实现RFM调用,远程功能暂不开始执行,等待COMMIT WORK 语句出现时,一次性执行一个或多个远程功能远程功能调用时,仅允许通过值传递参数,不能进行引用传递,因为在RFC过程中,可以传递参数,并返回结果,但不能改变调用程序的上下文对表类型参数,在本地普通功能调用中默认为引用传递,不需要创建内表的本地副本,但RFC不支持引用传递机制,将进行隐式的值传递调用,必须在RFC客户和RFC服务器之间交换整个表,只传输实际表格,如果没有指定表参数,则在被调用功能中使用空表RFC 创建连接类型时:1.LOAD BALANCING选择NO:指定TARGET HOST,SYSTEM NUMBER2. LOAD BALANCING选择YES,要指定TARGET SYSTEM (SM51),MESSAGE SERVER(RZ03),GROUP(SMLG)除去SM59定义的远程目标之外,SAP提供两个预定义目标,可以再CALL FUNCTION 语句的DESTINATION附加附件中使用:l目标NONE,将运行当前程序的应用服务器作为目标系统,调用过程将通过RFC接口实现,并拥有RFC上下文,应用于任意调用类型l目标BACK,用于被远程调用的RFM内部的CALL FUNCTION 语句中的目标制定,通过已建立的RFC连接反过来调用该模块的调用者或已载入的其他功能模块SAP ABAP 系统间的RFC实现(通过RFM实现)远程调用RFM:1.远程目标可以是文字或变量,其值为SAP系统中一直的远程目标系统。
rfc2674.Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering and Vir
Network Working Group E. Bell Request for Comments: 2674 3Com Corp. Category: Standards Track A. Smith Extreme Networks P. Langille Newbridge Networks A. Rijhsinghani Cabletron Systems K. McCloghrie cisco Systems August 1999 Definitions of Managed Objects for Bridges with TrafficClasses, Multicast Filtering and Virtual LAN ExtensionsStatus of this MemoThis document specifies an Internet standards track protocol for theInternet community, and requests discussion and suggestions forimprovements. Please refer to the current edition of the "InternetOfficial Protocol Standards" (STD 1) for the standardization stateand status of this protocol. Distribution of this memo is unlimited. Copyright NoticeCopyright (C) The Internet Society (1999). All Rights Reserved. AbstractThis memo defines a portion of the Management Information Base (MIB)for use with network management protocols in TCP/IP based internets.In particular, it defines two MIB modules for managing the newcapabilities of MAC bridges defined by the IEEE 802.1D-1998 MACBridges and the IEEE 802.1Q-1998 Virtual LAN (VLAN) standards forbridging between Local Area Network (LAN) segments. One MIB moduledefines objects for managing the ’Traffic Classes’ and ’EnhancedMulticast Filtering’ components of IEEE 802.1D-1998. The other MIBmodule defines objects for managing IEEE 802.1Q VLANs.Provisions are made for support of transparent bridging. Provisionsare also made so that these objects apply to bridges connected bysubnetworks other than LAN segments. This memo also includes several MIB modules in a manner that is compliant to the SMIv2 [V2SMI].This memo supplements RFC 1493 [BRIDGEMIB] and (to a lesser extent)RFC 1525 [SBRIDGEMIB].Bell, et al. Standards Track [Page 1]Table of Contents1 The SNMP Management Framework (3)2 Overview (4)2.1 Scope (4)3 Structure of MIBs (5)3.1 Structure of Extended Bridge MIB module (5)3.1.1 Relationship to IEEE 802.1D-1998 Manageable Objects (6)3.1.2 Relationship to IEEE 802.1Q Manageable Objects (8)3.1.3 The dot1dExtBase Group (8)3.1.4 The dot1dPriority Group (9)3.1.5 The dot1dGarp Group (9)3.1.6 The dot1dGmrp Group (9)3.1.7 The dot1dTpHCPortTable (9)3.1.8 The dot1dTpPortOverflowTable (9)3.2 Structure of Virtual Bridge MIB module (9)3.2.1 Relationship to IEEE 802.1Q Manageable Objects (9)3.2.2 The dot1qBase Group (13)3.2.3 The dot1qTp Group (13)3.2.4 The dot1qStatic Group (13)3.2.5 The dot1qVlan Group (13)3.3 Textual Conventions (13)3.4 Relationship to Other MIBs (14)3.4.1 Relationship to the ’system’ group (14)3.4.2 Relation to Interfaces MIB (14)3.4.2.1 Layering Model (15)3.4.2.2 ifStackTable (16)3.4.2.3 ifRcvAddressTable (16)3.4.3 Relation to Original Bridge MIB (16)3.4.3.1 The dot1dBase Group (16)3.4.3.2 The dot1dStp Group (17)3.4.3.3 The dot1dTp Group (17)3.4.3.4 The dot1dStatic Group (17)3.4.3.5 Additions to the Original Bridge MIB (18)4 Definitions for Extended Bridge MIB (18)5 Definitions for Virtual Bridge MIB (39)6 Acknowledgments (80)7 Security Considerations (80)8 References (81)9 Authors’ Addresses (84)10 Intellectual Property (85)11 Full Copyright Statement (86)Bell, et al. Standards Track [Page 2]1. The SNMP Management FrameworkThe SNMP Management Framework presently consists of five majorcomponents:o An overall architecture, described in an Architecture forDescribing SNMP Management Frameworks [ARCH].o Mechanisms for describing and naming objects and events for thepurpose of management. The first version of this Structure ofManagement Information (SMI) is called SMIv1 and described in STD 16, RFC 1155 [V1SMI], STD 16, RFC 1212 [V1CONCISE] and RFC 1215[V1TRAPS]. The second version, called SMIv2, is described in STD 58, RFC 2578 [V2SMI], STD 58, RFC 2579 [V2TC] and STD 58, RFC2580 [V2CONFORM].o Message protocols for transferring management information. Thefirst version of the SNMP message protocol is called SNMPv1 anddescribed in STD 15, RFC 1157 [V1PROTO]. A second version of the SNMP message protocol, which is not an Internet standards trackprotocol, is called SNMPv2c and described in RFC 1901[V2COMMUNITY] and RFC 1906 [V2TRANS]. The third version of themessage protocol is called SNMPv3 and described in RFC 1906[V2TRANS], Message Processing and Dispatching [V3MPC] and User-based Security Model [V3USM].o Protocol operations for accessing management information. Thefirst set of protocol operations and associated PDU formats isdescribed in STD 15, RFC 1157 [V1PROTO]. A second set ofprotocol operations and associated PDU formats is described inRFC 1905 [V2PROTO].o A set of fundamental applications described in SNMPv3Applications [V3APPS] and the view-based access control mechanism described in View-based Access Control Model [V3VACM].Managed objects are accessed via a virtual information store, termed the Management Information Base or MIB. Objects in the MIB aredefined using the mechanisms defined in the SMI.This memo specifies a MIB module that is compliant to the SMIv2. AMIB conforming to the SMIv1 can be produced through the appropriatetranslations. The resulting translated MIB must be semanticallyequivalent, except where objects or events are omitted because notranslation is possible (use of Counter64). Some machine readableinformation in SMIv2 will be converted into textual descriptions in Bell, et al. Standards Track [Page 3]SMIv1 during the translation process. However, this loss of machine readable information is not considered to change the semantics of the MIB.2. OverviewA common device present in many networks is the Bridge. This device is used to connect Local Area Network segments below the networklayer. These devices are often known as ’layer 2 switches’.There are two major modes defined for this bridging: Source-Route and transparent. Source-Route bridging is described by IEEE 802.5[802.5]. and is not discussed further in this document.The transparent method of bridging is defined by IEEE 802.1D-1998[802.1D] which is an update to the original IEEE 802.1D specification [802.1D-ORIG]. Managed objects for that original specification oftransparent bridging were defined in RFC 1493 [BRIDGEMIB].The original IEEE 802.1D is augmented by IEEE 802.1Q-1998 [802.1Q] to provide support for ’virtual bridged LANs’ where a single bridgedphysical LAN network may be used to support multiple logical bridged LANs, each of which offers a service approximately the same as thatdefined by IEEE 802.1D. Such virtual LANs (VLANs) are an integralfeature of switched LAN networks. A VLAN can be viewed as a group of end-stations on multiple LAN segments and can communicate as if they were on a single LAN. IEEE 802.1Q defines port-based Virtual LANswhere membership is determined by the bridge port on which dataframes are received. This memo defines the objects needed for themanagement of port-based VLANs in bridge entities.This memo defines those objects needed for the management of abridging entity operating in the transparent mode, as well as someobjects applicable to all types of bridges. Managed objects forSource-Route bridging are defined in RFC 1525 [SRBRIDGEMIB].2.1. ScopeThis MIB includes a comprehensive set of managed objects whichattempts to match the set defined in IEEE 802.1D and IEEE 802.1Q.However, to be consistent with the spirit of the SNMP Framework, asubjective judgement was made to omit the objects from thosestandards most ’costly’ to implement in an agent and least’essential’ for fault and configuration management. The omissionsare described in section 3 below.Bell, et al. Standards Track [Page 4]Historical note:The original bridge MIB [BRIDGEMIB] used the following principles for determining inclusion of an object in the BRIDGE-MIB module:(1) Start with a small set of essential objects and add only asfurther objects are needed.(2) Require objects be essential for either fault or configuration management.(3) Consider evidence of current use and/or utility.(4) Limit the total of objects.(5) Exclude objects which are simply derivable from others inthis or other MIBs.(6) Avoid causing critical sections to be heavily instrumented.The guideline that was followed is one counter per criticalsection per layer.3. Structure of MIBsThis document defines additional objects, on top of those existing in the original BRIDGE-MIB module defined in [BRIDGEMIB]: that MIBmodule is to be maintained unchanged for backwards compatibility.Section 3.4.3 of the present document contains some recommendationsregarding usage of objects in the original bridge MIB by devicesimplementing the enhancements defined here.Two MIB modules are defined here:(1) Managed objects for an extended bridge MIB module P-BRIDGE-MIB for the traffic class and multicast filtering enhancementsdefined by IEEE 802.1D-1998 [802.1D].(2) Managed objects for a virtual bridge MIB module Q-BRIDGE-MIBfor the Virtual LAN bridging enhancements defined by IEEE802.1Q-1998 [802.1Q].3.1. Structure of Extended Bridge MIB moduleObjects in this MIB are arranged into groups. Each group isorganized as a set of related objects. The overall structure andassignment of objects to their groups is shown below.Bell, et al. Standards Track [Page 5]3.1.1. Relationship to IEEE 802.1D-1998 Manageable ObjectsThis section contains a cross-reference to the objects defined inIEEE 802.1D-1998 [802.1D]. It also details those objects that arenot considered necessary in this MIB module.Some objects defined by IEEE 802.1D-1998 have been included in thevirtual bridge MIB module rather than this one: entries indot1qTpGroupTable, dot1qForwardAllTable anddot1qForwardUnregisteredTable are required for virtual bridged LANswith additional indexing (e.g. per-VLAN, per-FDB) and so are notdefined here. Instead, devices which do not implement virtualbridged LANs but do implement the Extended Forwarding Servicesdefined by IEEE 802.1D (i.e. dynamic learning of multicast groupaddresses and group service requirements in the filtering database)should implement these tables with a fixed value for dot1qFdbId (the value 1 is recommended) or dot1qVlanIndex (the value 1 isrecommended). Devices which support Extended Filtering Servicesshould support dot1qTpGroupTable, dot1qForwardAllTable anddot1qForwardUnregisteredTable.Bell, et al. Standards Track [Page 6]Extended Bridge MIB Name IEEE 802.1D-1998 Namedot1dExtBase Bridgedot1dDeviceCapabilitiesdot1dExtendedFilteringServicesdot1dTrafficClassesdot1dTrafficClassesEnableddot1dGmrpStatus .ApplicantAdministrativeControl dot1dPrioritydot1dPortPriorityTabledot1dPortDefaultUserPriority .UserPrioritydot1dPortNumTrafficClassesdot1dUserPriorityRegenTable .UserPriorityRegenerationTabledot1dUserPrioritydot1dRegenUserPrioritydot1dTrafficClassTable .TrafficClassTabledot1dTrafficClassPrioritydot1dTrafficClassdot1dPortOutboundAccessPriorityTable.OutboundAccessPriorityTabledot1dPortOutboundAccessPrioritydot1dGarpdot1dPortGarpTabledot1dPortGarpJoinTime .JoinTimedot1dPortGarpLeaveTime .LeaveTimedot1dPortGarpLeaveAllTime .LeaveAllTimedot1dGmrpdot1dPortGmrpTabledot1dPortGmrpStatus .ApplicantAdministrativeControldot1dPortGmrpFailedRegistrations .FailedRegistrationsdot1dPortGmrpLastPduOrigin .OriginatorOfLastPDUdot1dTpdot1dTpHCPortTabledot1dTpHCPortInFrames .BridgePort.FramesReceiveddot1dTpHCPortOutFrames .ForwardOutBounddot1dTpHCPortInDiscards .DiscardInbounddot1dTpPortOverflowTabledot1dTpPortInOverflowFrames .BridgePort.FramesReceiveddot1dTpPortOutOverflowFrames .ForwardOutBounddot1dTpPortInOverflowDiscards .DiscardInboundBell, et al. Standards Track [Page 7]The following IEEE 802.1D-1998 management objects have not beenincluded in the Bridge MIB for the indicated reasons.IEEE 802.1D-1998 Object DispositionBridge.StateValue not considered usefulBridge.ApplicantAdministrativeControlnot provided per-attribute(e.g. per-VLAN, per-Group).Only per-{device,port,application} control is provided in this MIB.3.1.2. Relationship to IEEE 802.1Q Manageable ObjectsThis section contains section number cross-references to manageableobjects defined in IEEE 802.1Q-1998 [802.1Q]. These objects havebeen included in this MIB as they provide a natural fit with the IEEE 802.1D objects with which they are co-located.Extended Bridge MIB Name IEEE 802.1Q-1998 Section and Name dot1dExtBase Bridgedot1dDeviceCapabilitiesdot1qStaticEntryIndividualPort 5.2 implementation optionsdot1qIVLCapabledot1qSVLCapabledot1qHybridCapabledot1qConfigurablePvidTagging 12.10.1.1 read bridge vlanconfigdot1dLocalVlanCapabledot1dPortCapabilitiesTabledot1dPortCapabilitiesdot1qDot1qTagging 5.2 implementation optionsdot1qConfigurableAcceptableFrameTypes5.2 implementation optionsdot1qIngressFiltering 5.2 implementation options3.1.3. The dot1dExtBase GroupThis group contains the objects which are applicable to all bridgesimplementing the traffic class and multicast filtering features ofIEEE 802.1D-1998 [802.1D]. It includes per-device configuration ofGARP and GMRP protocols. This group will be implemented by alldevices which implement the extensions defined in 802.1D-1998.Bell, et al. Standards Track [Page 8]3.1.4. The dot1dPriority GroupThis group contains the objects for configuring and reporting status of priority-based queuing mechanisms in a bridge. This includes per- port user_priority treatment, mapping of user_priority in frames into internal traffic classes and outbound user_priority andaccess_priority.3.1.5. The dot1dGarp GroupThis group contains the objects for configuring and reporting onoperation of the Generic Attribute Registration Protocol (GARP).3.1.6. The dot1dGmrp GroupThis group contains the objects for configuring and reporting onoperation of the GARP Multicast Registration Protocol (GMRP).3.1.7. The dot1dTpHCPortTableThis table extends the dot1dTp group from the original bridge MIB[BRIDGEMIB] and contains the objects for reporting port bridgingstatistics for high capacity network interfaces.3.1.8. The dot1dTpPortOverflowTableThis table extends the dot1dTp group from the original bridge MIB[BRIDGEMIB] and contains the objects for reporting the upper bits of port bridging statistics for high capacity network interfaces forwhen 32-bit counters are inadequate.3.2. Structure of Virtual Bridge MIB moduleObjects in this MIB are arranged into groups. Each group isorganized as a set of related objects. The overall structure andassignment of objects to their groups is shown below. Somemanageable objects defined in the original bridge MIB [BRIDGEMIB]need to be indexed differently when they are used in a VLAN bridging environment: these objects are, therefore, effectively duplicated by new objects with different indexing which are defined in the Virtual Bridge MIB.3.2.1. Relationship to IEEE 802.1Q Manageable ObjectsThis section contains section-number cross-references to manageableobjects defined in clause 12 of IEEE 802.1Q-1998 [802.1Q]. It alsodetails those objects that are not considered necessary in this MIBmodule.Bell, et al. Standards Track [Page 9]Note: unlike IEEE 802.1D-1998, IEEE 802.1Q-1998 [802.1Q] did notdefine exact syntax for a set of managed objects: the followingcross-references indicate the section numbering of the descriptionsof management operations from clause 12 in the latter document.Virtual Bridge MIB object IEEE 802.1Q-1998 Referencedot1qBasedot1qVlanVersionNumber 12.10.1.1 read bridge vlan config dot1qMaxVlanId 12.10.1.1 read bridge vlan config dot1qMaxSupportedVlans 12.10.1.1 read bridge vlan config dot1qNumVlansdot1qGvrpStatus 12.9.2.1/2 read/set garpapplicant controlsdot1qTpdot1qFdbTabledot1qFdbIddot1qFdbDynamicCount 12.7.1.1.3 read filtering d/basedot1qTpFdbTabledot1qTpFdbAddressdot1qTpFdbPortdot1qTpFdbStatusdot1qTpGroupTable 12.7.7.1 read filtering entrydot1qTpGroupAddressdot1qTpGroupEgressPortsdot1qTpGroupLearntdot1qForwardAllTable 12.7.7.1 read filtering entrydot1qForwardAllPortsdot1qForwardAllStaticPortsdot1qForwardAllForbiddenPortsdot1qForwardUnregisteredTable 12.7.7.1 read filtering entrydot1qForwardUnregisteredPortsdot1qForwardUnregisteredStaticPortsdot1qForwardUnregisteredForbiddenPortsdot1qStaticdot1qStaticUnicastTable 12.7.7.1 create/delete/readfiltering entry12.7.6.1 read permanent databasedot1qStaticUnicastAddressdot1qStaticUnicastReceivePortdot1qStaticUnicastAllowedToGoTodot1qStaticUnicastStatusdot1qStaticMulticastTable 12.7.7.1 create/delete/readfiltering entry12.7.6.1 read permanent databasedot1qStaticMulticastAddressdot1qStaticMulticastReceivePortdot1qStaticMulticastStaticEgressPortsBell, et al. Standards Track [Page 10]dot1qStaticMulticastForbiddenEgressPortsdot1qStaticMulticastStatusdot1qVlandot1qVlanNumDeletesdot1qVlanCurrentTable 12.10.2.1 read vlan configuration 12.10.3.5 read VID to FIDallocations12.10.3.6 read FID allocated toVID12.10.3.7 read VIDs allocated toFIDdot1qVlanTimeMarkdot1qVlanIndexdot1qVlanFdbIddot1qVlanCurrentEgressPortsdot1qVlanCurrentUntaggedPortsdot1qVlanStatusdot1qVlanCreationTimedot1qVlanStaticTable 12.7.7.1/2/3 create/delete/readfiltering entry12.7.6.1 read permanent database12.10.2.2 create vlan config12.10.2.3 delete vlan configdot1qVlanStaticName 12.4.1.3 set bridge namedot1qVlanStaticEgressPortsdot1qVlanForbiddenEgressPortsdot1qVlanStaticUntaggedPortsdot1qVlanStaticRowStatusdot1qNextFreeLocalVlanIndexdot1qPortVlanTable 12.10.1.1 read bridge vlanconfigurationdot1qPvid 12.10.1.2 configure PVID valuesdot1qPortAcceptableFrameTypes 12.10.1.3 configure acceptableframe types parameterdot1qPortIngressFiltering 12.10.1.4 configure ingressfiltering parametersdot1qPortGvrpStatus 12.9.2.2 read/set garp applicantcontrolsdot1qPortGvrpFailedRegistrationsdot1qPortGvrpLastPduOrigindot1qPortVlanStatisticsTable 12.6.1.1 read forwarding portcountersdot1qTpVlanPortInFramesdot1qTpVlanPortOutFramesdot1qTpVlanPortInDiscardsdot1qTpVlanPortInOverflowFramesdot1qTpVlanPortOutOverflowFramesdot1qTpVlanPortInOverflowDiscardsBell, et al. Standards Track [Page 11]dot1qPortVlanHCStatisticsTable 12.6.1.1 read forwarding portcountersdot1qTpVlanPortHCInFramesdot1qTpVlanPortHCOutFramesdot1qTpVlanPortHCInDiscardsdot1qLearningConstraintsTable 12.10.3.1/3/4 read/set/deletevlan learning constraints 12.10.3.2 read vlan learningconstraints for VIDdot1qConstraintVlandot1qConstraintSetdot1qConstraintTypedot1qConstraintStatusdot1qConstraintSetDefaultdot1qConstraintTypeDefaultThe following IEEE 802.1Q management objects have not been includedin the Bridge MIB for the indicated reasons.IEEE 802.1Q-1998 Operation Dispositionreset bridge (12.4.1.4) not considered usefulreset vlan bridge (12.10.1.5) not considered usefulread forwarding port counters (12.6.1.1)discard on error details not considered usefulread permanent database (12.7.6.1)permanent database size not considered usefulnumber of static filtering count rows inentries dot1qStaticUnicastTable +dot1qStaticMulticastTablenumber of static VLAN count rows inregistration entries dot1qVlanStaticTableread filtering entry range use GetNext operation.(12.7.7.4)read filtering database (12.7.1.1)filtering database size not considered usefulnumber of dynamic group address count rows applicable to each entries (12.7.1.3) FDB in dot1dTpGroupTableBell, et al. Standards Track [Page 12]read garp state (12.9.3.1) not considered usefulnotify vlan registration failure not considered useful(12.10.1.6)notify learning constraint violation(12.10.3.10) not considered useful3.2.2. The dot1qBase GroupThis mandatory group contains the objects which are applicable to all bridges implementing IEEE 802.1Q virtual LANs.3.2.3. The dot1qTp GroupThis group contains objects that control the operation and report the status of transparent bridging. This includes management of thedynamic Filtering Databases for both unicast and multicastforwarding. This group will be implemented by all bridges thatperform destination-address filtering.3.2.4. The dot1qStatic GroupThis group contains objects that control static configurationinformation for transparent bridging. This includes management ofthe static entries in the Filtering Databases for both unicast andmulticast forwarding.3.2.5. The dot1qVlan GroupThis group contains objects that control configuration and reportstatus of the Virtual LANs known to a bridge. This includesmanagement of the statically configured VLANs as well as reportingVLANs discovered by other means e.g. GVRP. It also controlsconfiguration and reports status of per-port objects relating toVLANs and reports traffic statistics. It also provides formanagement of the VLAN Learning Constraints.3.3. Textual ConventionsThe datatypes MacAddress, BridgeId, Timeout, EnabledStatus, PortList, VlanIndex and VlanId are used as textual conventions in thisdocument. These textual conventions have NO effect on either thesyntax nor the semantics of any managed object. Objects definedusing these conventions are always encoded by means of the rules that define their primitive type. Hence, no changes to the SMI or theSNMP are necessary to accommodate these textual conventions which are adopted merely for the convenience of readers.Bell, et al. Standards Track [Page 13]3.4. Relationship to Other MIBsAs described above, some IEEE 802.1D management objects have not been included in this MIB because they overlap with objects in other MIBs applicable to a bridge implementing this MIB. In particular, it isassumed that a bridge implementing this MIB will also implement (atleast) the ’system’ group defined in MIB-II [MIB2], the ’interfaces’ group defined in [INTERFACEMIB] and the original bridge MIB[BRIDGEMIB].3.4.1. Relationship to the ’system’ groupIn MIB-II, the ’system’ group is defined as being mandatory for allsystems such that each managed entity contains one instance of eachobject in the ’system’ group. Thus, those objects apply to theentity as a whole irrespective of whether the entity’s solefunctionality is bridging, or whether bridging is only a subset ofthe entity’s functionality.3.4.2. Relation to Interfaces MIBThe Interfaces Group MIB [INTERFACEMIB], requires that any MIB which is an adjunct of the Interfaces Group MIB, clarify specific areaswithin the Interfaces Group MIB. These areas were intentionally left vague in the Interfaces Group MIB to avoid over-constraining the MIB, thereby precluding management of certain media-types.The Interfaces Group MIB enumerates several areas which a media-specific MIB must clarify. Each of these areas is addressed in afollowing subsection. The implementor is referred to the Interfaces Group MIB in order to understand the general intent of these areas.In the Interfaces Group MIB, the ’interfaces’ group is defined asbeing mandatory for all systems and contains information on anentity’s interfaces, where each interface is thought of as beingattached to a ‘subnetwork’. (Note that this term is not to beconfused with ‘subnet’ which refers to an addressing partitioningscheme used in the Internet suite of protocols.) The term ’segment’ is used in this memo to refer to such a subnetwork, whether it be an Ethernet segment, a ’ring’, a WAN link, or even an X.25 virtualcircuit.Implicit in this Extended Bridge MIB is the notion of ports on abridge. Each of these ports is associated with one interface of the ’interfaces’ group (one row in ifTable) and, in most situations, each port is associated with a different interface. However, there aresituations in which multiple ports are associated with the sameBell, et al. Standards Track [Page 14]interface. An example of such a situation would be several portseach corresponding one-to-one with several X.25 virtual circuits but all on the same interface.Each port is uniquely identified by a port number. A port number has no mandatory relationship to an interface number, but in the simplecase a port number will have the same value as the correspondinginterface’s interface number. Port numbers are in the range(1..dot1dBaseNumPorts).Some entities perform other functionality as well as bridging through the sending and receiving of data on their interfaces. In suchsituations, only a subset of the data sent/received on an interfaceis within the domain of the entity’s bridging functionality. Thissubset is considered to be delineated according to a set ofprotocols, with some protocols being bridged, and other protocols not being bridged. For example, in an entity which exclusively performed bridging, all protocols would be considered as being bridged, whereas in an entity which performed IP routing on IP datagrams and onlybridged other protocols, only the non-IP data would be considered as being bridged. Thus, this Extended Bridge MIB (and in particular,its counters) is applicable only to that subset of the data on anentity’s interfaces which is sent/received for a protocol beingbridged. All such data is sent/received via the ports of the bridge.3.4.2.1. Layering ModelThis memo assumes the interpretation of the Interfaces Group to be in accordance with the Interfaces Group MIB [INTERFACEMIB] which states that the interfaces table (ifTable) contains information on themanaged resource’s interfaces and that each sub-layer below theinternetwork layer of a network interface is considered an interface. This document recommends that, within an entity, VLANs which areinstantiated as an entry in dot1qVlanCurrentTable by eithermanagement configuration through dot1qVlanStaticTable or by dynamicmeans (e.g. through GVRP), are NOT also represented by an entry inifTable.Where an entity contains higher-layer protocol entities e.g. IP-layer interfaces that transmit and receive traffic to/from a VLAN, theseshould be represented in the ifTable as interfaces of typepropVirtual(53). Protocol-specific types such as l3ipxvlan(137)should not be used here since there is no implication that the bridge will perform any protocol filtering before delivering up to thesevirtual interfaces.Bell, et al. Standards Track [Page 15]3.4.2.2. ifStackTableIn addition, the Interfaces Group MIB [INTERFACEMIB] defines a table ’ifStackTable’ for describing the relationship between logicalinterfaces within an entity. It is anticipated that implementorswill use this table to describe the binding of e.g. IP interfaces to physical ports, although the presence of VLANs makes therepresentation less than perfect for showing connectivity: theifStackTable cannot represent the full capability of the IEEE 802.1Q VLAN bridging standard since that makes a distinction between VLANbindings on ’ingress’ to and ’egress’ from a port: theserelationships may or may not be symmetrical whereas Interface MIBEvolution assumes a symmetrical binding for transmit and receive.This makes it necessary to define other manageable objects forconfiguring which ports are members of which VLANs.3.4.2.3. ifRcvAddressTableThis table contains all MAC addresses, unicast, multicast, andbroadcast, for which an interface will receive packets and forwardthem up to a higher layer entity for local consumption. Note thatthis does not include addresses for data-link layer control protocols such as Spanning-Tree, GMRP or GVRP. The format of the address,contained in ifRcvAddressAddress, is the same as for ifPhysAddress.This table does not include unicast or multicast addresses which are accepted for possible forwarding out some other port. This table is explicitly not intended to provide a bridge address filteringmechanism.3.4.3. Relation to Original Bridge MIBThis section defines how objects in the original bridge MIB module[BRIDGEMIB] should be represented for devices which implement theextensions: some of the old objects are less useful in such devicesbut must still be implemented for reasons of backwards compatibility. Note that formal conformance statements for that MIB module do notexist since it is defined in SMIv1.3.4.3.1. The dot1dBase GroupThis mandatory group contains the objects which are applicable to all types of bridges. Interpretation of this group is unchanged.Bell, et al. Standards Track [Page 16]。
金仓数据库认证工程师(KCE)考试试题_含答案_
金仓数据库认证工程师(KCE)考试试题姓名:学号:特别说明:考试时间为90分钟,考试形式为闭卷考试。
一、多项选择题(每题5分,共25分)1.启动KingbaseES 数据库查询分析器的方法有(ABC)A.通过开始菜单,选择KingbaseES安装程序组中的查询分析器启动B.通过JManager工具启动C.在命令行输入如下命令:"java -jar JSQL.jar"启动D.在控制管理器中点击启动按钮启动2.三权分立包括(ABD)A.系统管理员B.安全管理员C.系统分析员D.审计管理员3.数据更新语句有以下几类(ACD)A.插入语句B.查询语句C.修改语句D.删除语句4. KingbaseES支持下列哪些字符集?(ABCD )A.GBK B.ASCII C.UNICODE D.GB180305.下列属于KingbaseES命令行工具的有?(BCD )A.Isqlplus B.Iagent C.Ikill D.Isql1二、判断题(每题3分,共15分)1.如果在本机上安装了一个KingbaseES数据库,数据库名为AAA,数据库用户名为:BBB,密码为:CCC。
端口号为54321。
那么,isql系统工具的登录可以使用下面的命令实现:在命令行中bin目录下输入“isql -h localhost -p 54321 -U BBB -W CCC -d AAA”回车即可。
(Y)2. 在KingbaseES数据库SCOTT模式下的EMP表中,查询与SMITH这个员工职位相同的所有员工的员工编号,姓名,薪水和职位。
可以用以下子查询语句实现:(F)SELECT Empno, Ename, Sal, JobFROM EMPWHERE Job=(SELECT JobFROM EMPWHERE Ename='SMITH');3. 在进行数据库删除时,被删除的数据库有用户连接时,不影响数据库的正常删除。
Mysql性能监控项及sql语句
网络错误503请刷新页面重试持续报错请尝试更换浏览器或网络环境
Mysql性能监控项及 sql语句
推荐一款mysql监控软件MONyog 1、查询缓存: mysql> show variables like '%query_cache%'; 2、缓存在Cache中线程数量thread_cache_size: mysql> show variables like 'thread%'; 3、DB已连接的线程数: mysql> show status like 'connections'; 4、当前连接线程状态: mysql> show status like '%thread%'; 5、索引缓存大小: mysql> show variables like 'key_buffer_size'; 6、索引缓存未命中率: mysql> show global status like 'key_read%'; 7、索引缓存命中率: mysql> show global status like 'key_%'; 8、索引读取统计: mysql> show global status like 'key_blocks_u'; key_blocks_unused表示未使用的缓存簇(blocks)数,key_blocks_used表示曾经用到的最大的blocks,如果缓存都用到了,要么增 加key_buffer_size,要么过度索引,把缓存占满了。 9、并发最大连接数-允许最大连接数(一般500到800比较合适): mysql> show variables like 'max_connections'; 10、并发最大连接数-服务器响应最大连接数: mysql> show global status like 'max_used_connections'; 11、并发最大连接数-当前连接数: mysql> show global status like 'connections'; 12、并发最大连接数-线程队列(值越小越好): mysql> show variables like 'back_log'; 13、临时表: mysql> show global status like 'created_tmp%'; 临时表比较大无法在内存完成时就不得使用磁盘文件,如果'created_tmp_tables非常大,则可能是系统中的排序操作过多,或者是表连 接方式优化不够。 14、mysql服务器对临时表的配置: mysql> show variables where variable_name in ('temp_able_siae','max_heap_table_size'); 当临时表空间小于max_heap_table_size时,才能全部放入内存。 15、表扫描情况: mysql> show global status like 'handler_read%'; mysql> show global status like 'com_select'; 如果表扫描率超过4000,说明进行太多表扫描,可能索引没有建好,增加read_buffer_size值会有好处,但不要查8M。
2022~2023中级软考考试题库及答案参考68
2022~2023中级软考考试题库及答案1. SHAI 算法的消息摘要长度是()位A.128B.160C.256D.512正确答案:B2. “家校互通”是一种双向活动,家庭和学校是互通中的双主体。
正确答案:正确3. 在Windows中,若在某一文档中连续进行了多次剪切操作,关闭该文档后,"剪贴板"中存放的是空白。
正确答案:错误4. 《国家保密法》对违法人员的量刑标准是()。
A.国家机关工作人员违法保护国家秘密的规定,故意或者过失泄露国家秘密,情节严重的,处三年以下有期徒刑或者拘役;情节特别严重的,处三年以上七年以下有期徒刑B.国家机关工作人员违法保护国家秘密的规定,故意或者过失泄露国家秘密,情节严重的,处四年以下有期徒刑或者拘役;情节特别严重的,处四年以上七年以下有期徒刑C.国家机关工作人员违法保护国家秘密的规定,故意或者过失泄露国家秘密,情节严重的,处五年以下有期徒刑或者拘役;情节特别严重的,处五年以上七年以下有期徒刑D.国家机关工作人员违法保护国家秘密的规定,故意或者过失泄露国家秘密,情节严重,处七年以下有期徒刑或者拘役;情节特别严重的,处七年以下有期徒刑正确答案:5. 某公司财务管理数据只能提供给授权用户,通过采取安全管理措施确保不能被未授权的个人、实体或过程利用或知悉,以确保数据的()A.保密性B.完整性C.可用性D.稳定性正确答案:A6. 关于变更控制委员会( CCB)的描述,不正确的是( )。
B的成员可能包括客户或项目经理的上级领导B.一般来说,项目经理会担任 CCB的组长C.针对某些变更,除了 CCB批准以外,可能还需要客户批准D.针对可能影响项目目标的变更,必须经过 CCB批准正确答案:B7. 令序列X、Y、Z的每个元素都按顺序进栈,且每个元素进栈和出栈仅一次。
则不可能得到的出栈序列是()。
A.XYZB.XZYC.ZXYD.YZX正确答案:C8. AES是一种非对称算法。
entitlements参数
entitlements参数【原创版】目录1.介绍 entitlements 参数的概念和作用2.entitlements 参数的常见类型3.entitlements 参数的应用场景4.使用 entitlements 参数的注意事项5.总结正文一、介绍 entitlements 参数的概念和作用entitlements 参数,又称为权益参数,是一种用于定义用户或用户组所拥有的权限或特权的数据结构。
在软件开发和系统配置中,entitlements 参数被广泛应用于控制用户对特定功能或资源的访问权限,以实现对系统资源的精细化管理和保护。
通过 entitlements 参数,开发者和运维人员可以灵活地为用户或用户组分配不同的权限,以满足不同场景下的需求。
二、entitlements 参数的常见类型entitlements 参数有多种表现形式,常见的类型包括:1.访问控制列表(ACL):访问控制列表是一种用于定义用户或用户组对某一资源(如文件、数据库表等)访问权限的数据结构。
ACL 通常包含一系列访问权限,如读、写、执行等,以及一系列用户或用户组的名字。
通过 ACL,可以灵活地为不同用户或用户组分配不同的访问权限。
2.角色(Role):角色是一种用于定义用户在系统中所扮演的角色或职能的数据结构。
角色通常包含一系列权限或操作,以及一系列与该角色相关的用户或用户组。
通过角色,可以方便地将一组相关的权限或操作分配给多个用户或用户组。
3.标签(Tag):标签是一种用于标识某一资源或权限的数据结构。
通过为资源或权限添加标签,可以方便地对它们进行分类和管理。
标签通常与 ACL 或角色结合使用,以实现对资源的精细化访问控制。
三、entitlements 参数的应用场景entitlements 参数在许多场景下都有广泛应用,例如:1.用户认证:在用户登录系统时,需要验证用户的身份并确定其所拥有的权限。
通过 entitlements 参数,可以实现对不同用户的不同权限控制,以确保系统资源的安全。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Network Working Group B. Ray Request for Comments: 3276 PESA Switching Systems Category: Standards Track R. Abbi Alcatel May 2002 Definitions of Managed Objects for High Bit-Rate DSL - 2nd generation(HDSL2) and Single-Pair High-Speed Digital SubscriberLine (SHDSL) LinesStatus of this MemoThis document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions forimprovements. Please refer to the current edition of the "InternetOfficial Protocol Standards" (STD 1) for the standardization stateand status of this protocol. Distribution of this memo is unlimited. Copyright NoticeCopyright (C) The Internet Society (2002). All Rights Reserved. AbstractThis document defines a portion of the Management Information Base(MIB) module for use with network management protocols in theInternet community. In particular, it describes objects used formanaging High Bit-Rate DSL - 2nd generation (HDSL2) and Single-PairHigh-Speed Digital Subscriber Line (SHDSL) interfaces.Table of Contents1. Introduction (2)2. The SNMP Network Management Framework (2)3. Introduction (3)3.1 Relationship of the HDSL2/SHDSL Line MIB to other MIBs (3)3.2 IANA Considerations (5)4. Conventions used in the MIB (5)4.1 Naming Conventions (5)4.2 Textual Conventions (6)4.3 Structure (7)4.4 Counters, Interval Buckets and Thresholds (10)4.5 Profiles (11)4.6 Notifications (12)5. Conformance and Compliance (14)6. Definitions (14)7. Security Considerations (60)Ray & Abbi Standards Track [Page 1]8. Acknowledgments (62)9. References (63)10. Intellectual Property Notice (65)11. Authors’ Addresses (65)12. Full Copyright Statement (66)1. IntroductionThis document defines a portion of the Management Information Base(MIB) module for use with network management protocols in theInternet community. In particular, it describes objects used formanaging High Bit-Rate DSL - 2nd generation (HDSL2) [18] and Single- Pair High-Speed Digital Subscriber Line (SHDSL) interfaces [19].2. The SNMP Management FrameworkThe SNMP Management Framework presently consists of five majorcomponents:o An overall architecture, described in RFC 2571 [1].o Mechanisms for describing and naming objects and events for thepurpose of management. The first version of this Structure ofManagement Information (SMI) is called SMIv1 and is described inSTD 16, RFC 1155 [2], STD 16, RFC 1212 [3], and RFC 1215 [4]. The second version, called SMIv2, is described in STD 58, RFC 2578[5], RFC 2579 [6], and RFC 2580 [7].o Message protocols for transferring management information. Thefirst version of the SNMP message protocol is called SNMPv1 and is described in STD 15, RFC 1157 [8]. A second version of the SNMPmessage protocol, which is not an Internet standards trackprotocol, is called SNMPv2c and described is in RFC 1901 [9] andRFC 1906 [10]. The third version of the message protocol iscalled SNMPv3 and is described in RFC 1906 [10], RFC 2572 [11],and RFC 2574 [12].o Protocol operations for accessing management information. Thefirst set of protocol operations and associated PDU formats isdescribed in STD 15, RFC 1157 [8]. A second set of protocoloperations and associated PDU formats is described in RFC 1905[13].o A set of fundamental applications described in RFC 2573 [14] andthe view-based access control mechanism described in RFC 2575[15].Ray & Abbi Standards Track [Page 2]A more detailed introduction to the current SNMP Management Framework can be found in RFC 2570 [16].Managed objects are accessed via a virtual information store, termed the Management Information Base or MIB. Objects in the MIB aredefined using the mechanisms defined in the SMI.This memo specifies a MIB module that is compliant to the SMIv2. AMIB conforming to the SMIv1 can be produced through the appropriatetranslations. The resulting translated MIB must be semanticallyequivalent, except where objects or events are omitted because notranslation is possible (use of Counter64). Some machine readableinformation in SMIv2 will be converted into textual descriptions inSMIv1 during the translation process. However, this loss of machine readable information is not considered to change the semantics of the MIB.The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT","SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [17].3. IntroductionThis document describes an SNMP MIB for managing HDSL2/SHDSL Lines.These definitions are based upon the specifications for the HDSL2 and SHDSL Embedded Operations Channel (EOC) as defined in ANSIT1E1.4/2000-006 [18] and ITU G.991.2 [19].The MIB is located in the MIB tree under MIB 2 transmission, asdiscussed in the MIB-2 Integration (RFC 1213 [20] and RFC 2863 [21]) section of this document.3.1. Relationship of the HDSL2/SHDSL Line MIB to other MIBsThis section outlines the relationship of this MIB with other MIBsdescribed in RFCs. Specifically, IF-MIB as presented in RFC 2863[21] is discussed.3.1.1 General IF-MIB Integration (RFC 2863)The HDSL2/SHDSL Line MIB specifies the detailed attributes of a data interface. As such, it needs to integrate with RFC 2863 [21]. TheIANA has assigned the following ifTypes to HDSL2 and SHDSL:Ray & Abbi Standards Track [Page 3]IANAifType ::= TEXTUAL-CONVENTION...SYNTAX INTEGER {...hdsl2 (168), -- High Bit-Rate DSL, 2nd generationshdsl (169), -- Multirate HDSL2...}Note that the ifFixedLengthGroup from RFC 2863 [21] MUST be supported and that the ifRcvAddressGroup does not apply to this MIB.3.1.2 Usage of ifTableThe MIB branch identified by this ifType contains tables appropriate for this interface type. Most such tables extend the ifEntry table, and are indexed by ifIndex. For interfaces in systems implementingthis MIB, those table entries indexed by ifIndex MUST be persistent. The following attributes are part of the mandatory ifGeneral group in RFC 2863 [21], and are not duplicated in the HDSL2/SHDSL Line MIB.Ray & Abbi Standards Track [Page 4]===================================================================ifIndex Interface index.ifDescr See interfaces MIB [21].ifType hdsl2(168) or shdsl(169).ifSpeed Set as appropriate.(This is fixed at 1552000 for HDSL2lines)ifPhysAddress This object MUST have an octet stringwith zero length.ifAdminStatus See interfaces MIB [21].ifOperStatus See interfaces MIB [21].ifLastChange See interfaces MIB [21].ifName See interfaces MIB [21].ifLinkUpDownTrapEnable Default to enabled(1).ifHighSpeed Set as appropriate.(For HDSL2 lines, this is fixed at 2)ifConnectorPresent Set as appropriate.===================================================================Figure 1: Use of ifTable Objects3.2 IANA ConsiderationsThe HDSL2-SHDSL-LINE-MIB module requires the allocation of a singleobject identifier for its MODULE-IDENTITY. The IANA has allocatedthis object identifier in the transmission subtree (48), defined inthe SNMPv2-SMI MIB module.4. Conventions used in the MIB4.1. Naming ConventionsA. xtuC refers to a central site terminal unit;H2TU-C for HDSL2, or STU-C for SHDSL.B. xtuR refers to a remote site terminal unit;H2TU-R for HDSL2, or STU-R for SHDSL.C. xtu refers to a terminal unit; either an xtuC or xtuR.Ray & Abbi Standards Track [Page 5]D. xru refer to a regenerator unit;H2RU for HDSL2, or SRU for SHDSL.E. xU refers to any HDSL2/SHDSL unit; either an xtu or xru.F. CRC is cyclic redundancy check [19].G. ES means errored second [19].H. LOSW means loss of sync word [19].I. LOSWS means LOSW seconds [19].J. SES means severely errored second [19].K. SNR means signal-to-noise ratio [19].L. UAS means unavailable second [19].4.2. Textual ConventionsThe following textual conventions are defined to reflect the linetopology in the MIB (further discussed in the following section) and to define the behavior of the statistics to be maintained by anagent.o Hdsl2ShdslUnitId:Attributes with this syntax uniquely identify each unit in aHDSL2/SHDSL span. It mirrors the EOC addressing mechanism:xtuC(1) - CO terminal unitxtuR(2) - CPE terminal unitxru1(3) .. xru8(10) - regenerators, numbered fromcentral office sideo Hdsl2ShdslUnitSide:Attributes with this syntax reference the two sides of a unit:networkSide(1) - N in figure 2, belowcustomerSide(2) - C in figure 2, belowo Hdsl2ShdslWirePair:Attributes with this syntax reference the wire-pairs connecting theunits:wirePair1(1) - First pair for HDSL2/SHDSL.wirePair2(2) - Optional second pair for SHDSL only.o Hdsl2ShdslTransmissionModeType:Attributes with this syntax specify the regional setting for a SHDSL line. Specified as a BITS construct, the two mode types are:Ray & Abbi Standards Track [Page 6]region1 - ITU-T G.991.2 Annex Aregion2 - ITU-T G.991.2 Annex Bo Hdsl2ShdslPerfCurrDayCount:Attributes with this syntax define the behavior of the 1-day (24hour) gauges found in the MIB.o Hdsl2Shdsl1DayIntervalCount:Attributes with this syntax define the behavior of the 1-day (24hour) interval counters found in the MIB.o Hdsl2ShdslPerfTimeElapsed:Attributes with this syntax define the behavior of the elapsed timecounters found in the MIB.o Hdsl2ShdslPerfIntervalThreshold:Attributes with this syntax define the behavior of the alarmthresholds found in the MIB.o Hdsl2ShdslClockReferenceTypeAttributes with this syntax define the clock references for theHDSL2/SHDSL span.4.3. StructureThe MIB is structured into following MIB groups:o Span Configuration Group:This group supports MIB objects for configuring parameters for theHDSL2/SHDSL span. It contains the following table:- hdsl2ShdslSpanConfTableo Span Status Group:This group supports MIB objects for retrieving span statusinformation. It contains the following table:- hdsl2ShdslSpanStatusTableRay & Abbi Standards Track [Page 7]o Unit Inventory Group:This group supports MIB objects for retrieving unit inventoryinformation about units in HDSL2/SHDSL lines via the EOC. It contains the following table:- hdsl2ShdslInventoryTableo Segment Endpoint Configuration Group:This group supports MIB objects for configuring parameters for theHDSL2/SHDSL segment endpoints. It contains the following table:- hdsl2ShdslEndpointConfTableo Segment Endpoint Current Status/Performance Group:This group supports MIB objects that provide the currentstatus/performance information relating to segment endpoints. Itcontains the following table:- hdsl2ShdslEndpointCurrTableo Segment Endpoint 15-Minute Interval Status/Performance Group:This group supports MIB objects that provide historicstatus/performance information relating to segment endpoints in 15-minute intervals. It contains the following table:- hdsl2Shdsl15MinIntervalTableo Segment Endpoint 1-Day Interval Status/Performance Group:This group supports MIB objects that provide historicstatus/performance information relating to segment endpoints in 1-day intervals. It contains the following table:- hdsl2Shdsl1DayIntervalTableo Maintenance Group:This group supports MIB objects for performing maintenance operations such as loopbacks for HDSL2/SHDSL lines. It contains the followingtable(s):- hdsl2ShdslEndpointMaintTable- hdsl2ShdslUnitMaintTableRay & Abbi Standards Track [Page 8]o Span Configuration Profile Group:This group supports MIB objects for defining configuration profilesfor HDSL2/SHDSL Spans. It contains the following table:- hdsl2ShdslSpanConfProfileTableo Segment Endpoint Alarm Configuration Profile Group:This group supports MIB objects for defining alarm configurationprofiles for HDSL2/SHDSL Segment Endpoints. It contains thefollowing table:- hdsl2ShdslEndpointAlarmConfProfileTableo Notifications Group:This group defines the notifications supported for HDSL2/SHDSL lines: - hdsl2ShdslLoopAttenCrossing- hdsl2ShdslSNRMarginCrossing- hdsl2ShdslPerfESThresh- hdsl2ShdslPerfSESThresh- hdsl2ShdslPerfCRCanomaliesThresh- hdsl2ShdslPerfLOSWSThresh- hdsl2ShdslPerfUASThresh- hdsl2ShdslSpanInvalidNumRepeaters- hdsl2ShdslLoopbackFailure- hdsl2ShdslpowerBackoff- hdsl2ShdsldeviceFault- hdsl2ShdsldcContinuityFault- hdsl2ShdslconfigInitFailure- hdsl2ShdslprotocolInitFailure- hdsl2ShdslnoNeighborPresent- hdsl2ShdslLocalPowerLoss4.3.1 Line TopologyAn HDSL2/SHDSL Line consists of a minimum of two units - xtuC (thecentral termination unit) and an xtuR (the remote termination unit). The line may optionally support up to 8 repeater/regenerator units(xru) as shown in the figure below.Ray & Abbi Standards Track [Page 9]<-- Network Side Customer Side -->|</////////////////// HDSL2/SHDSL Span ////////////////////>|<˜˜˜> <˜˜˜> HDSL2/SHDSL Segments <˜˜˜>+-------+ +-------+ +-------+ +-------+ +-------++ C=1=N C=1=N C=..1..=N C=1=N +| xtuC | | xru1 | | xru2 | | xru8 | | xtuR |+ C=2=N C=2=N C=..2..=N C=2=N ++-------+ +-------+ +-------+ +-------+ +-------+Key: <////> HDSL2/SHDSL Span<˜˜˜˜> HDSL2/SHDSL Segment=1= HDSL2/SHDSL wire-pair-1=2= SHDSL optional wire-pair-2 (Not applicable to HDSL2)C Customer Side Segment Endpoint (modem)N Network Side Segment Endpoint (modem)Figure 2: General topology for an HDSL2/SHDSL Line4.4. Counters, Interval Buckets and ThresholdsFor SNR Margin, Loop Attenuation, ES, SES, CRC anomalies, LOSW, andUAS, there are event counters, current 15-minute and 0 to 96 15-minute history bucket(s) of "interval-counters", as well as currentand 0 to 30 previous 1-day interval-counter(s). Each current 15-minute event bucket has an associated threshold notification.Unlike RFC 2493 [22] and RFC 2662 [23], there is no representation in the MIB for invalid buckets. In those cases where the data for aninterval is suspect or known to be invalid, the agent MUST NOT report the interval. If the current 15-minute event bucket is determined to be invalid, notifications based upon the value of the event bucketMUST NOT be generated.Not reporting an interval will result in holes in the associatedtable. For example, the table, hdsl2Shdsl15MinIntervalTable, isindexed by { ifIndex, hdsl2ShdslInvIndex, hdsl2ShdslEndpointSide,hdsl2ShdslEndpointWirePair, hdsl2Shdsl15MinIntervalNumber}. Ifinterval 12 is determined to be invalid but intervals 11 and 13 arevalid, a Get Next operation on the indices .1.1.1.1.11 would returnindices .1.1.1.1.13.Ray & Abbi Standards Track [Page 10]There is no requirement for an agent to ensure a fixed relationshipbetween the start of a fifteen minute interval and any wall clock;however some implementations may align the fifteen minute intervalswith quarter hours. Likewise, an implementation may choose to align one day intervals with the start of a day.Counters are not reset when an xU is reinitialized, only when theagent is reset or reinitialized (or under specific request outsidethe scope of this MIB).4.5. ProfilesAs a managed node can handle a large number of xUs, (e.g., hundredsor perhaps thousands of lines), provisioning every parameter on every xU may become burdensome. Moreover, most lines are provisionedidentically with the same set of parameters. To simplify theprovisioning process, this MIB makes use of profiles. A profile is a set of parameters that can be shared by multiple lines using the same configuration.The following profiles are used in this MIB:o Span Configuration Profiles - Span configuration profiles contain parameters for configuring HDSL2/SHDSL spans. They are defined in the hdsl2ShdslSpanConfProfileTable. Since span configurationparameters are only applicable for SHDSL, the support for spanconfiguration profiles are optional for HDSL2 interfaces.Note that the configuration of the span dictates the behavior for each individual segment end point in the span. If a differentconfiguration is provisioned for any given segment end pointwithin the span, the new configuration for this segment end point will override the span configuration for this segment end pointonly.o Segment Endpoint Alarm Configuration Profiles - These profilescontain parameters for configuring alarm thresholds forHDSL2/SHDSL segment endpoints. These profiles are defined in the hdsl2ShdslEndpointAlarmConfProfileTable.The index value for this profile is a locally-uniqueadministratively assigned name for the profile having the textual convention ‘SnmpAdminString’ (RFC 2571 [1]).One or more lines may be configured to share parameters of a singleprofile (e.g., hdsl2ShdslEndpointAlarmConfProfile = ‘silver’) bysetting its hdsl2ShdslEndpointAlarmConfProfile objects to the valueof this profile. If a change is made to the profile, all lines that Ray & Abbi Standards Track [Page 11]refer to it will be reconfigured to the changed parameters. Before a profile can be deleted or taken out of service it must be firstunreferenced from all associated lines.Implementations MUST provide a default profile whose name is ‘DEFVAL’ for each profile type. The values of the associated parameters will be vendor specific unless otherwise indicated in this document.Before a line’s profiles have been set, these profiles will beautomatically used by setting hdsl2ShdslEndpointAlarmConfProfile and hdsl2ShdslSpanConfProfile to ‘DEFVAL’ where appropriate. Thisdefault profile name, ’DEFVAL’, is considered reserved in the context of profiles defined in this MIB.Profiles are created, assigned, and deleted dynamically using theprofile name and profile row status in each of the four profiletables.Profile changes MUST take effect immediately. These changes MAYresult in a restart (hard reset or soft restart) of the units on the line.4.6. NotificationsThe ability to generate the SNMP notifications coldStart/WarmStart(per [21]) which are per agent (e.g., per Digital Subscriber LineAccess Multiplexer, or DSLAM, in such a device), and linkUp/linkDown (per [21]) which are per interface (i.e., HDSL2/SHDSL line) isrequired.A linkDown notification MAY be generated whenever any of ES, SES, CRC Anomaly, LOSW, or UAS event occurs. The corresponding linkUpnotification MAY be sent when all link failure conditions arecleared.The notifications defined in this MIB are for initialization failure and for the threshold crossings associated with the following events: ES, SES, CRC Anomaly, LOSW, and UAS. Each threshold has its ownenable/threshold value. When that value is 0, the notification isdisabled.The hdsl2ShdslEndpointCurrStatus is a bitmask representing alloutstanding error conditions associated with a particular SegmentEndpoint. Note that since status of remote endpoints is obtained via the EOC, this information may be unavailable for units that areunreachable via EOC during a line error condition. Therefore, notall conditions may always be included in its current status.Notifications corresponding to the bit fields in this object aredefined.Ray & Abbi Standards Track [Page 12]Two alarm conditions, SNR Margin Alarm and Loop Attenuation Alarm,are organized in a manner slightly different from that implied in the EOC specifications. In the MIB, these alarm conditions are tied tothe two thresholds hdsl2ShdslEndpointThreshSNRMargin andhdsl2ShdslEndpointThreshLoopAttenuation found in thehdsl2ShdslEndpointAlarmConfProfileTable. In the EOC, the alarmconditions associated with these thresholds are per-unit. In theMIB, these alarm conditions are per-endpoint. For terminal units,this has no impact. For repeaters, this implies an implementationvariance where the agent in the terminal unit is responsible fordetecting a threshold crossing. As the reporting of a repeaterdetected alarm condition to the polling terminal unit occurs in thesame EOC message as the reporting of the current SNR Margin and Loop Attenuation values, it is anticipated that this will have very little impact on agent implementation.A threshold notification occurs whenever the corresponding current15-minute interval error counter becomes equal to, or exceeds thethreshold value. One notification may be sent per interval perinterface. Since the current 15-minute counter is reset to 0 every15 minutes, and if the condition persists, the notification may recur as often as every 15 minutes. For example, to get a notificationwhenever a "loss of" event occurs (but at most once every 15minutes), set the corresponding threshold to 1. The agent willgenerate a notification when the event originally occurs.Note that the Network Management System, or NMS, may receive alinkDown notification, as well, if enabled (viaifLinkUpDownTrapEnable [21]). At the beginning of the next 15 minute interval, the counter is reset. When the first second goes by andthe event occurs, the current interval bucket will be 1, which equals the threshold, and the notification will be sent again.A hdsl2ShdslSpanInvalidNumRepeaters notification may be generatedfollowing completion of the discovery phase if the number ofrepeaters discovered on the line differs from the number of repeaters specified in hdsl2ShdslSpanConfNumRepeaters. For those conditionswhere the number of provisioned repeaters is greater than thoseencountered during span discovery, all table entries associated with the nonexistent repeaters are to be discarded. For those conditions where the number of provisioned repeaters is less than thoseencountered during span discovery, additional table entries are to be created using the default span configuration profile.Ray & Abbi Standards Track [Page 13]5. Conformance and ComplianceFor both HDSL2 and SHDSL lines, the following group(s) are mandatory: hdsl2ShdslSpanConfGrouphdsl2ShdslSpanStatusGrouphdsl2ShdslInventoryGrouphdsl2ShdslEndpointConfGrouphdsl2Shdsl15MinIntervalGrouphdsl2Shdsl1DayIntervalGrouphdsl2ShdslMaintenanceGrouphdsl2ShdslEndpointAlarmConfGrouphdsl2ShdslNotificationGroupFor HDSL2 lines, the following group(s) are optional:hdsl2ShdslSpanConfProfileGrouphdsl2ShdslSpanShdslStatusGroup6. DefinitionsHDSL2-SHDSL-LINE-MIB DEFINITIONS ::= BEGINIMPORTSMODULE-IDENTITY,OBJECT-TYPE,Counter32,Unsigned32,Gauge32,NOTIFICATION-TYPE,Integer32,transmission FROM SNMPv2-SMIRowStatus,TEXTUAL-CONVENTION FROM SNMPv2-TCifIndex FROM IF-MIBPerfCurrentCount,PerfIntervalCount FROM PerfHist-TC-MIBSnmpAdminString FROM SNMP-FRAMEWORK-MIBMODULE-COMPLIANCE,OBJECT-GROUP,NOTIFICATION-GROUP FROM SNMPv2-CONF;hdsl2ShdslMIB MODULE-IDENTITYLAST-UPDATED "200205090000Z" -- May 9, 2002ORGANIZATION "ADSLMIB Working Group"CONTACT-INFO "WG-email: adslmib@Info: https:///mailman/listinfo/adslmib Chair: Mike SneedRay & Abbi Standards Track [Page 14]Postal: P.O. Box 37324Raleigh NC 27627-7324Email: sneedmike@Co-editor: Bob RayPESA Switching Systems, Inc.Postal: 330-A Wynn DriveHuntsville, AL 35805 USAEmail: rray@Phone: +1 256 726 9200 ext. 142Co-editor: Rajesh AbbiAlcatel USAPostal: 2912 Wake Forest RoadRaleigh, NC 27609-7860 USAEmail: Rajesh.Abbi@Phone: +1 919 850 6194"DESCRIPTION"This MIB module defines a collection of objects for managingHDSL2/SHDSL lines. An agent may reside at either end of theline, however the MIB is designed to require no managementcommunication between the modems beyond that inherent in thelow-level EOC line protocol as defined in ANSI T1E1.4/2000-006(for HDSL2 lines), or in ITU G.991.2 (for SHDSL lines)."REVISION "200205090000Z" -- May 9, 2002DESCRIPTION "Initial version, published as RFC 3276."::= { transmission 48 }hdsl2ShdslMibObjects OBJECT IDENTIFIER ::= { hdsl2ShdslMIB 1 }-- Textual Conventions used in this MIB--Hdsl2ShdslPerfCurrDayCount ::= TEXTUAL-CONVENTIONSTATUS currentDESCRIPTION"A gauge associated with interface performance measurements ina current 1-day (24 hour) measurement interval.The value of this gauge starts at zero at the beginning of aninterval and is increased when associated events occur, untilthe end of the 1-day interval. At that time the value of thegauge is stored in the previous 1-day history interval, asdefined in a companion object of typeRay & Abbi Standards Track [Page 15]Hdsl2Shdsl1DayIntevalCount, and the current interval gaugeis restarted at zero.In the case where the agent has no valid data available forthis interval the corresponding object instance is notavailable and upon a retrieval request a corresponding errormessage shall be returned to indicate that this instance doesnot exist. Please note that zero is a valid value."SYNTAX Gauge32Hdsl2Shdsl1DayIntervalCount ::= TEXTUAL-CONVENTIONSTATUS currentDESCRIPTION"A counter associated with interface performance measurementsduring the most previous 1-day (24 hour) measurement interval.The value of this gauge is equal to the value of the currentday gauge, as defined in a companion object of typeHdsl2ShdslPerfCurrDayCount, at the end of its most recentinterval.In the case where the agent has no valid data available forthis interval the corresponding object instance is notavailable and upon a retrieval request a corresponding errormessage shall be returned to indicate that this instance doesnot exist."SYNTAX Gauge32Hdsl2ShdslPerfTimeElapsed ::= TEXTUAL-CONVENTIONSTATUS currentDESCRIPTION"The number of seconds that have elapsed since the beginning ofthe current measurement period. If, for some reason, such asan adjustment in the system’s time-of-day clock or the additionof a leap second, the current interval exceeds the maximumvalue, the agent will return the maximum value.For 15 minute intervals, the range is limited to (0..899).For 24 hour intervals, the range is limited to (0..86399)."SYNTAX Unsigned32(0..86399)Hdsl2ShdslPerfIntervalThreshold ::= TEXTUAL-CONVENTIONSTATUS currentDESCRIPTION"This convention defines a range of values that may be set ina fault threshold alarm control. As the number of seconds ina 15-minute interval numbers at most 900, objects of this typemay have a range of 0...900, where the value of 0 disables thealarm."Ray & Abbi Standards Track [Page 16]SYNTAX Unsigned32(0..900)Hdsl2ShdslUnitId ::= TEXTUAL-CONVENTIONSTATUS currentDESCRIPTION"This is the unique identification for all units in aHDSL2/SHDSL Span. It is based on the EOC unit addressingscheme with reference to the xtuC."SYNTAX INTEGER{xtuC(1),xtuR(2),xru1(3),xru2(4),xru3(5),xru4(6),xru5(7),xru6(8),xru7(9),xru8(10)}Hdsl2ShdslUnitSide ::= TEXTUAL-CONVENTIONSTATUS currentDESCRIPTION"This is the referenced side of a HDSL2/SHDSL unit - Networkor Customer side. The side facing the Network is the Networkside, while the side facing the Customer is the Customer side."SYNTAX INTEGER{networkSide(1),customerSide(2)}Hdsl2ShdslWirePair ::= TEXTUAL-CONVENTIONSTATUS currentDESCRIPTION"This is the referenced pair of wires in a HDSL2/SHDSL Segment.HDSL2 only supports a single pair (wirePair1), while SHDSLsupports an optional second pair (wirePair2)."SYNTAX INTEGER{wirePair1(1),wirePair2(2)}Hdsl2ShdslTransmissionModeType ::= TEXTUAL-CONVENTIONSTATUS currentRay & Abbi Standards Track [Page 17]。