Question

List the OID prefixes for which a manager would need to be granted write permission if...

List the OID prefixes for which a manager would need to be granted write permission if the manager were to be able to modify all settings in .1.3.6.1.2.1 and .1.3.6.1.4.1, and change their own local key, but not have access to columns in usmUserTable that would allow modification of other manager accounts. (The VACM table has an “exception” option to make this easier).

Homework Answers

Answer #1

Dear Student I would like you to read the provided information which will make it easier for you to approach the given problem.

A focal aspect of the SNMP Protocol is the means by which to name every gadget property in a reliable way. The naming plan picked was the Object Identifier, or OID, progression.

All OIDs utilized by SNMP start with the prefix 1.3.6.1. For instance, the sysName characteristic relates to OID 1.3.6.1.2.1.1.5. The prefix 1.3.6.1.2.1 is known as mib-2, and the one-venture longer prefix 1.3.6.1.2.1.1 is framework. At times we will mishandle documentation and go about as though names alluded to single extra levels as opposed to full prefixes, eg the last two names in mib-2.system.sysName.

The fundamental SNMP read activity is Get() (sent by means of the GetRequest convention message), which accepts an OID as boundary. The operator accepting the Get solicitation will, if validation looks at and if the OID relates to a substantial property, return a couple comprising of the OID and the trait esteem. We will re-visitation of this in 21.8 SNMP Operations, and perceive how different property estimations can be mentioned in a solitary activity.

OIDs structure a tree or order; the prompt kid hubs of, state, 1.3.6.1 of length 4 are on the whole hubs 1.3.6.1.N of length 5. The root hub, with this comprehension, is mysterious; OIDs are here and there delivered with a main "." to stress this: .1.3.6.1. On the other hand, the numbers can be thought of as marks on the circular segments of the tree as opposed to the hubs.

There is no characteristic method to recognize interior OID hubs – prefixes – from leaf OID hubs that relate to real named objects. Setting is fundamental here.

It isn't unexpected to give the numeric marks at a particular level comprehensible string reciprocals. The three hubs quickly underneath the root are, with their standard string reciprocals

itu-t(0)

iso(1)

joint-iso-itu-t(2)

The string counterparts can be thought of as outer information; when OIDs are encoded just the numeric qualities are incorporated.

OID naming has been received in a few non-SNMP settings too. ISO and ITU-T both use OIDs to distinguish official norms records. The X.509 standard uses OID naming in encryption declarations; see RFC 5280. The X.500 index standard additionally utilizes OIDs; the connected RFC 4524 characterizes a few OID classes prefixed by 0.9.2342.19200300.100.1. As a non-figuring model, Health Level Seven names US medical care data starting with the OID prefix 2.16.840.1.113883.

As referenced above, SNMP utilizes OIDs starting with 1.3.6.1; in the OID tree these levels relate to

iso(1)

org(3): associations

dod(6): the US Department of Defense, the first patron of the Internet

internet(1), evidently the main sublevel of DOD

Here is a part of the OID tree demonstrating a couple of different tasks in the iso subtree, and featuring the 1.3.6.1 prefix above. More passages are accessible from oid-info.com/get.

itu-t(0)

iso(1)

standard(0)

enrollment authority(1)

part body(2)

distinguished organization(3)

nist(5)

dod(6)

icd-ecma(12) (European Computer Manufacturers Association)

oiw(14) (OSE Implementers Workshop)

edifactboard(15)

ewos(16) (European Workshop on Open Systems)

osf(22) (Open Software Foundation)

nordunet(23)

nato(26)

icao(27) (International Civil Aviation Organization)

amazon(187) (the creator has no clue if Amazon right now utilizes this)

joint-iso-itu-t(2)

This SNMP 1.3.6.1 prefix is explained in RFC 1155 by means of the language structure

web OBJECT IDENTIFIER ::= { iso org(3) dod(6) 1 }

which implies that the string web has the sort OBJECT IDENTIFIER and its genuine worth is the rundown to one side of ::=: 1.3.6.1. The utilization of iso here speaks to the OID prefix .1, adroitly unique in relation to simply the level iso(1). The proper linguistic structure here is ASN.1, as characterized by the ITU-T standard X.680. We will develop this beneath in 21.6 ASN.1 Syntax and SNMP.

After the abovementioned, RFC 1155 at that point characterizes the OID prefixes for the board data, mgmt, and for private-merchant use, private, as

mgmt OBJECT IDENTIFIER ::= { web 2 }

private OBJECT IDENTIFIER ::= { web 4 }

Once more, web speaks to the recently characterized prefix 1.3.6.1. Most universally useful SNMP OIDs start with the mgmt prefix. The private prefix is for OIDs speaking to seller explicit data; for instance, the prefix 1.3.6.1.4.1.9 has been assigned to Cisco Systems, Inc. RFC 1155 states that both the mgmt and private prefixes are assigned by the IAB to the IANA.

Duty regarding appointing names that start with a given OID prefix can without much of a stretch be assigned. The Internet Activities Board, for instance, is responsible for 1.3.6.1.

All the Information regarding your question have been provided above I hope I have given my best to resolve your query and will help you to improve knowledge towards the informative part

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Write a scope statement based on the information below: Analysis Design Implementation Collect list of 20...
Write a scope statement based on the information below: Analysis Design Implementation Collect list of 20 projects Gather detailed requirements for desired outputs from the database Enter project data Gather information on projects Create fully attributed, normalized data model Test database Define draft requirements Create list of edit rules for fields, determine default values, develop queries, and determine formats for reports Make adjustments, as needed Create entity relationship diagram for database Develop list of queries required for database Conduct user...
Case You own a small computer business and you specialize in setting up networks for small...
Case You own a small computer business and you specialize in setting up networks for small businesses. The owner of a local sporting goods store has hired you to set up a local area network for his business. He wants to connect computers located in an office, on the selling floor, in a series of rooms in which he offers personal training classes, in a section of the store with batting cages, and in the section of the store that...
Based on the Case below, Write a brief explanation that explains why the case represents its...
Based on the Case below, Write a brief explanation that explains why the case represents its particular ACHE competency domain. (Be sure that the explanation justifies the assigned competency domain based upon the facts and circumstances of the case.) Case: Case 3: Leadership Mrs. Smith knew before any of her staff at General Valley Ob/Gyn that the practice had been sold to the area’s leading health system. The physician-owners of the practice were sure to keep her informed almost from...
PLEASE ANSWER ALL question Suppose you are the manager of Speedy Oil Change which claims that...
PLEASE ANSWER ALL question Suppose you are the manager of Speedy Oil Change which claims that it will change the oil in customers’ cars in less than 30 minutes on average. Further suppose that several complaints have been filed from customers stating that their oil change took longer than 30 minutes. Upper-level management at Speedy Oil Change headquarters has requested that you investigate the complaints. To begin your investigation, you randomly audit 36 oil changes performed by Speedy Oil Change...
65. Question 65 Which feature of this email is a red flag, indicating that it may...
65. Question 65 Which feature of this email is a red flag, indicating that it may be a phishing attack and not a legitimate account warning from PayPal? <<insert Paypal phishing email graphic>> 1 point Poor quality layout. Suspicious attachments. There is a hyperlink in the body of the email. Generic greetings and signature. 66. Question 66 Which three (3) of these are PCI-DSS requirements for any company handling, processing or transmitting credit card data? (Select 3) 1 point Assign...
You are required to write a Business Plan Report and you are advised to follow the...
You are required to write a Business Plan Report and you are advised to follow the below given outline.  Part I- Product/service idea Business Plan Report (40%) To make the best impression, a business plan should follow a convention structure, such as the outline shown below. Cover page Table of contents 1. Executive Summary  A succinct highlight of the overall plan- include ownership structure, business address, product/service, the management team and strategy and strengths. 2. Industry Analysis ...
Can someone please edit my code so that it satisfies the assignments' requirements? I pasted the...
Can someone please edit my code so that it satisfies the assignments' requirements? I pasted the codes below. Requirement: Goals for This Project:  Using class to model Abstract Data Type  OOP-Data Encapsulation You are asked to write an app to keep track of a relatively small music library. The app should load song information from a data file once the app is started. It should allow user to view, add, remove, and search for songs. The app should...
(Use the case of “Global Treps”) You have been selected as the project manager for the...
(Use the case of “Global Treps”) You have been selected as the project manager for the Global Treps project. You helped to run a local shark tank like event at your college last year as part of a class project, so you have a general idea of what is involved. The schedule goal is six months, and the budget is $120,000. Your favorite professor, Dr. K., and a few of her associates have agreed to fund the project. Your strengths...
Project Integration Management Questions Only A team member notifies you, after the fact, that she has...
Project Integration Management Questions Only A team member notifies you, after the fact, that she has added extra functionality to the project. There was no impact on the cost or schedule. What should be done as a result of this change? Make sure marketing is aware of the change. Implement change control processes to track the change. Inform the customer. Understand what functionality was added. You are having difficulty getting a project underway. You have not been able to get...
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...