Reference record for OID 1.3.111.2.802.1.1.15


parent
1.3.111.2.802.1.1 (ieee802dot1mibs)
node code
15
node name
ieee8021XPaeMIB
dot oid
1.3.111.2.802.1.1.15
type
MODULE-IDENTITY
asn1 oid
  • {iso(1) identified-organization(3) ieee(111) standards-association-numbered-series-standards(2) lan-man-stds(802) ieee802dot1(1) ieee802dot1mibs(1) ieee8021XPaeMIB(15)}
  • {iso(1) identified-organization(3) ieee(111) standards-association-numbers-series-standards(2) lan-man-stds(802) ieee802dot1(1) ieee802dot1mibs(1) ieee8021XPaeMIB(15)}
  • {iso(1) org(3) ieee(111) standards-association-numbered-series-standards(2) lan-man-stds(802) ieee802dot1(1) ieee802dot1mibs(1) ieee8021XPaeMIB(15)}
  • {iso(1) org(3) ieee(111) standards-association-numbers-series-standards(2) lan-man-stds(802) ieee802dot1(1) ieee802dot1mibs(1) ieee8021XPaeMIB(15)}
  • {iso(1) iso-identified-organization(3) ieee(111) standards-association-numbered-series-standards(2) lan-man-stds(802) ieee802dot1(1) ieee802dot1mibs(1) ieee8021XPaeMIB(15)}
  • {iso(1) iso-identified-organization(3) ieee(111) standards-association-numbers-series-standards(2) lan-man-stds(802) ieee802dot1(1) ieee802dot1mibs(1) ieee8021XPaeMIB(15)}
  • iri oid
  • /iso/identified-organization/ieee/standards-association-numbered-series-standards/lan-man-stds/ieee802dot1/ieee802dot1mibs/ieee8021XPaeMIB
  • /iso/identified-organization/ieee/standards-association-numbers-series-standards/lan-man-stds/ieee802dot1/ieee802dot1mibs/ieee8021XPaeMIB
  • /iso/org/ieee/standards-association-numbered-series-standards/lan-man-stds/ieee802dot1/ieee802dot1mibs/ieee8021XPaeMIB
  • /iso/org/ieee/standards-association-numbers-series-standards/lan-man-stds/ieee802dot1/ieee802dot1mibs/ieee8021XPaeMIB
  • /iso/iso-identified-organization/ieee/standards-association-numbered-series-standards/lan-man-stds/ieee802dot1/ieee802dot1mibs/ieee8021XPaeMIB
  • /iso/iso-identified-organization/ieee/standards-association-numbers-series-standards/lan-man-stds/ieee802dot1/ieee802dot1mibs/ieee8021XPaeMIB
  • iri by oid_info
    /ISO/Identified-Organization/111/2/802/1/1/15

    Description by oid_info

    ieee8021XPaeMIB MODULE-IDENTITY
    LAST-UPDATED "200910011650Z"
    ORGANIZATION "IEEE 802.1 Working Group"
    CONTACT-INFO
    "http://grouper.ieee.org/groups/802/1/index.html"
    DESCRIPTION
    "The MIB module for managing the Port Access Entity (PAE)
    functions of IEEE 802.1X (Revision of 802.1X-2004).
    The PAE functions managed are summarized in Figure 12-3 of
    IEEE 802.1X and include EAPOL PACP support for authentication
    (EAP Supplicant and/or Authenticator), MACsec Key Agreement
    (MKA), EAPOL, and transmission and reception of network
    announcements.
    The following acronyms and definitions are used in this MIB.
    AN : Association Number, a number that is concatenated with a
    MACsec Secure Channel Identifier to identify a Secure
    Association (SA).
    Announcer : EAPOL-Announcement transmission functionality.
    Authenticator : An entity that facilitates authentication of
    other entities attached to the same LAN.
    CA : secure Connectivity Association: A security relationship,
    established and maintained by key agreement protocols, that
    comprises a fully connected subset of the service access
    points in stations attached to a single LAN that are to be
    supported by MACsec.
    CAK : secure Connectivity Association Key, a secret key
    possessed by members of a given CA.
    CKN : secure Connectivity Association Key Name (CKN), a text
    that identifies a CAK.
    Common Port : An instance of the MAC Internal Sublayer Service
    used by the SecY or PAC to provide transmission and
    reception of frames for both the Controlled and
    Uncontrolled Ports.
    Controlled Port : The access point used to provide the secure
    MAC Service to a client of a PAC or SecY.
    CP state machine : Controlled Port state machine is capable of
    controlling a SecY or a PAC. The CP supports
    interoperability with unauthenticated systems that are not
    port-based network access control capable, or that lack
    MKA. When the access controlled port is supported by a
    SecY, the CP is capable of controlling the SecY so as to
    provide unsecured connectivity to systems that implement a
    PAC.
    EAP : Extensible Authentication Protocol, RFC3748.
    EAPOL : EAP over LANs.
    KaY : Key Agreement Entity, a PAE entity responsible for MKA.
    Key Server : Elected by MKA, to transport a succession of SAKs,
    for use by MACsec, to the other member(s) of a CA.
    KMD : Key Management Domain, a string identifying systems that
    share cached CAKs.
    Listener : The role is to receive the network announcement
    parameters in the authentication process.
    Logon Process : The Logon Process is responsible for the
    managing the use of authentication credentials, for
    initiating use of the PAE\s Supplicant and or Authenticator
    functionality, for deriving CAK, CKN tuples from PAE
    results, for maintaining PSKs (Pre-Sharing Keys), and for
    managing MKA instances. In the absence of successful
    authentication, key agreement, or support for MAC Security,
    the Logon Process determines whether the CP state machine
    should provide unauthenticated connectivity or
    authenticated but unsecured connectivity.
    MKA : MACsec Key Agreement protocol allows PAEs, each
    associated with a port that is an authenticated member of a
    secure connectivity association (CA) or a potential CA, to
    discover other PAEs attached to the same LAN, to confirm
    mutual possession of a CAK and hence to prove a past mutual
    authentication, to agree the secret keys (SAKs) used by
    MACsec for symmetric shared key cryptography, and to ensure
    that the data protected by MACsec has not been delayed.
    MKPDU : MACsec Key Agreement Protocol Data Unit.
    MPDU : MAC Protocol Data Unit.
    NID : Network Identity, a UTF-8 string identifying an network
    or network service.
    PAE : Port Access Entity, the protocol entity associated with a
    Port. It can support the protocol functionality
    associated with the Authenticator, the Supplicant, or
    both.
    PAC : Port Access Controller, a protocol-less shim that
    provides control over frame transmission and reception by
    clients attached to its Controlled Port, and uses the MAC
    Service provided by a Common Port. The access control
    decision is made by the PAE, typically taking into
    account the success or failure of mutual authentication
    and authorization of the PAE\s peer(s), and is
    communicated by the PAE using the LMI to set the PAC\s
    Controlled Port enabled/disable. Two different interfaces
    \Controlled Port\ and \Uncontrolled Port\, are associated
    with a PAC, and that for each instance of a PAC, two
    iftable rows (one for each interface) run on top of an
    iftable row representing the \Common Port\ interface,
    such as a row with iftype = \ethernetCsmacd(6)\.
    For example :
    -----------------------------------------------------------
    | | |
    | Controlled Port | Uncontrolled Port |
    | Interface | Interface |
    | (ifEntry = j) | (ifEntry = k) |
    | (iftype = | (iftype = |
    | macSecControlledIF(231)) | macSecUncontrolledIF(232))|
    | | |
    |---------------------------------------------------------|
    | |
    | Physical Interface |
    | (ifEntry = i) |
    | (iftype = ethernetCsmacd(6)) |
    |_________________________________________________________|
    i, j, k are ifIndex to indicate
    an interface stack in the iftable.
    Figure : PAC Interface Stack
    The \Controlled Port\ is the service point to provide one
    instance of the secure MAC service in a PAC. The
    \Uncontrolled Port\ is the service point to provide one
    instance of the insecure MAC service in a PAC.
    PACP : Port Access Controller Protocol.
    Port Identifier : A 16-bit number that is unique within the
    scope of the address of the port.
    Real Port : Indicates the PAE is for a real port. A port that
    is not created on demand by the mechanisms specified in
    this standard, but that can transmit and receive frames for
    one or more virtual ports.
    SC : Secure Channel, a security relationship used to provide
    security guarantees for frames transmitted from one member
    of a CA to the others. An SC is supported by a sequence of
    SAs thus allowing the periodic use of fresh keys without
    terminating the relationship.
    SA : Secure Association, a security relationship that provides
    security guarantees for frames transmitted from one member
    of a CA to the others. Each SA is supported by a single
    secret key, or a single set of keys where the cryptographic
    operations used to protect one frame require more than one
    key.
    SAK : Secure Association key, the secret key used by an SA.
    SCI : Secure Channel Identifier, a globally unique identifier
    for a secure channel, comprising a globally unique MAC
    Address and a Port Identifier, unique within the system
    allocated that address.
    secured connectivity : Data transfer between two or \Controlled
    Ports\ that is protected by MACsec.
    SecY : MAC Security Entity, the entity that operates the MAC
    Security protocol within a system.
    Supplicant : An entity at one end of a point-to-point LAN
    segment that seeks to be authenticated by an Authenticator
    attached to the other end of that link.
    Uncontrolled Port : The access point used to provide the
    insecure MAC Service to a client of a SecY or PAC.
    Virtual Port : Indicates the PAE is for a virtual port. A MAC
    Service or Internal Sublayer service access point that is
    created on demand. Virtual ports can be used to provide
    separate secure connectivity associations over the same
    LAN."
    REVISION "200910011650Z"
    DESCRIPTION
    "Initial version of this MIB module. Published as part of
    IEEE P802.1X (Revision of IEEE Standard 802.1X-2009)"

    View at oid-info.com

    Description by ieee802

    The MIB module for managing the Port Access Entity (PAE)
    functions of IEEE 802.1X (Revision of 802.1X-2004).
    The PAE functions managed are summarized in Figure 12-3 of
    IEEE 802.1X and include EAPOL PACP support for authentication
    (EAP Supplicant and/or Authenticator), MACsec Key Agreement
    (MKA), EAPOL, and transmission and reception of network
    announcements.

    The following acronyms and definitions are used in this MIB.

    AN : Association Number, a number that is concatenated with a
    MACsec Secure Channel Identifier to identify a Secure
    Association (SA).

    Announcer : EAPOL-Announcement transmission functionality.

    Authenticator : An entity that facilitates authentication of
    other entities attached to the same LAN.

    CA : secure Connectivity Association: A security relationship,
    established and maintained by key agreement protocols, that
    comprises a fully connected subset of the service access
    points in stations attached to a single LAN that are to be
    supported by MACsec.

    CAK : secure Connectivity Association Key, a secret key
    possessed by members of a given CA.

    CKN : secure Connectivity Association Key Name (CKN), a text
    that identifies a CAK.

    Common Port : An instance of the MAC Internal Sublayer Service
    used by the SecY or PAC to provide transmission and
    reception of frames for both the Controlled and
    Uncontrolled Ports.

    Controlled Port : The access point used to provide the secure
    MAC Service to a client of a PAC or SecY.

    CP state machine : Controlled Port state machine is capable of
    controlling a SecY or a PAC. The CP supports
    interoperability with unauthenticated systems that are not
    port-based network access control capable, or that lack
    MKA. When the access controlled port is supported by a
    SecY, the CP is capable of controlling the SecY so as to
    provide unsecured connectivity to systems that implement a
    PAC.

    EAP : Extensible Authentication Protocol, RFC3748.

    EAPOL : EAP over LANs.

    KaY : Key Agreement Entity, a PAE entity responsible for MKA.

    Key Server : Elected by MKA, to transport a succession of SAKs,
    for use by MACsec, to the other member(s) of a CA.

    KMD : Key Management Domain, a string identifying systems that
    share cached CAKs.

    Listener : The role is to receive the network announcement
    parameters in the authentication process.

    Logon Process : The Logon Process is responsible for the
    managing the use of authentication credentials, for
    initiating use of the PAE's Supplicant and or Authenticator
    functionality, for deriving CAK, CKN tuples from PAE
    results, for maintaining PSKs (Pre-Sharing Keys), and for
    managing MKA instances. In the absence of successful
    authentication, key agreement, or support for MAC Security,
    the Logon Process determines whether the CP state machine
    should provide unauthenticated connectivity or
    authenticated but unsecured connectivity.

    MKA : MACsec Key Agreement protocol allows PAEs, each
    associated with a port that is an authenticated member of a
    secure connectivity association (CA) or a potential CA, to
    discover other PAEs attached to the same LAN, to confirm
    mutual possession of a CAK and hence to prove a past mutual
    authentication, to agree the secret keys (SAKs) used by
    MACsec for symmetric shared key cryptography, and to ensure
    that the data protected by MACsec has not been delayed.

    MKPDU : MACsec Key Agreement Protocol Data Unit.

    MPDU : MAC Protocol Data Unit.

    NID : Network Identity, a UTF-8 string identifying an network
    or network service.

    PAE : Port Access Entity, the protocol entity associated with a
    Port. It can support the protocol functionality
    associated with the Authenticator, the Supplicant, or
    both.

    PAC : Port Access Controller, a protocol-less shim that
    provides control over frame transmission and reception by
    clients attached to its Controlled Port, and uses the MAC
    Service provided by a Common Port. The access control
    decision is made by the PAE, typically taking into
    account the success or failure of mutual authentication
    and authorization of the PAE's peer(s), and is
    communicated by the PAE using the LMI to set the PAC's
    Controlled Port enabled/disable. Two different interfaces
    'Controlled Port' and 'Uncontrolled Port', are associated
    with a PAC, and that for each instance of a PAC, two
    ifTable rows (one for each interface) run on top of an
    ifTable row representing the 'Common Port' interface,
    such as a row with ifType = 'ethernetCsmacd(6)'.

    For example :

    | | |
    | Controlled Port | Uncontrolled Port |
    | Interface | Interface |
    | (ifEntry = j) | (ifEntry = k) |
    | (ifType = | (ifType = |
    | macSecControlledIF(231)) | macSecUncontrolledIF(232))|
    | | |
    |
    | |
    | Physical Interface |
    | (ifEntry = i) |
    | (ifType = ethernetCsmacd(6)) |
    |_________________________________________________________|
    i, j, k are ifIndex to indicate
    an interface stack in the ifTable.
    Figure : PAC Interface Stack

    The 'Controlled Port' is the service point to provide one
    instance of the secure MAC service in a PAC. The
    'Uncontrolled Port' is the service point to provide one
    instance of the insecure MAC service in a PAC.

    PACP : Port Access Controller Protocol.

    Port Identifier : A 16-bit number that is unique within the
    scope of the address of the port.

    Real Port : Indicates the PAE is for a real port. A port that
    is not created on demand by the mechanisms specified in
    this standard, but that can transmit and receive frames for
    one or more virtual ports.

    SC : Secure Channel, a security relationship used to provide
    security guarantees for frames transmitted from one member
    of a CA to the others. An SC is supported by a sequence of
    SAs thus allowing the periodic use of fresh keys without
    terminating the relationship.

    SA : Secure Association, a security relationship that provides
    security guarantees for frames transmitted from one member
    of a CA to the others. Each SA is supported by a single
    secret key, or a single set of keys where the cryptographic
    operations used to protect one frame require more than one
    key.

    SAK : Secure Association key, the secret key used by an SA.

    SCI : Secure Channel Identifier, a globally unique identifier
    for a secure channel, comprising a globally unique MAC
    Address and a Port Identifier, unique within the system
    allocated that address.

    secured connectivity : Data transfer between two or 'Controlled
    Ports' that is protected by MACsec.

    SecY : MAC Security Entity, the entity that operates the MAC
    Security protocol within a system.

    Supplicant : An entity at one end of a point-to-point LAN
    segment that seeks to be authenticated by an Authenticator
    attached to the other end of that link.

    Suspension: Temporary suspension of MKA operation to facilitate
    in-service control plane software upgrades without
    disrupting existing secure connectivity.

    Uncontrolled Port : The access point used to provide the
    insecure MAC Service to a client of a SecY or PAC.

    Virtual Port : Indicates the PAE is for a virtual port. A MAC
    Service or Internal Sublayer service access point that is
    created on demand. Virtual ports can be used to provide
    separate secure connectivity associations over the same
    LAN.

    Information by oid_info

    Automatically extracted from IEEE Management Information Bases (MIBs)

    Information by ieee802

    ieee8021XPaeMIB MODULE-IDENTITY LAST-UPDATED "201404101619Z" ORGANIZATION "IEEE 802.1 Working Group" CONTACT-INFO " WG-URL: http://grouper.ieee.org/groups/802/1/index.html WG-EMail: [email protected] Contact: Mick Seaman Postal: C/O IEEE 802.1 Working Group IEEE Standards Association 445 Hoes Lane P.O. Box 1331 Piscataway NJ 08855-1331 USA E-mail: [email protected]" DESCRIPTION "The MIB module for managing the Port Access Entity (PAE) functions of IEEE 802.1X (Revision of 802.1X-2004). The PAE functions managed are summarized in Figure 12-3 of IEEE 802.1X and include EAPOL PACP support for authentication (EAP Supplicant and/or Authenticator), MACsec Key Agreement (MKA), EAPOL, and transmission and reception of network announcements. The following acronyms and definitions are used in this MIB. AN : Association Number, a number that is concatenated with a MACsec Secure Channel Identifier to identify a Secure Association (SA). Announcer : EAPOL-Announcement transmission functionality. Authenticator : An entity that facilitates authentication of other entities attached to the same LAN. CA : secure Connectivity Association: A security relationship, established and maintained by key agreement protocols, that comprises a fully connected subset of the service access points in stations attached to a single LAN that are to be supported by MACsec. CAK : secure Connectivity Association Key, a secret key possessed by members of a given CA. CKN : secure Connectivity Association Key Name (CKN), a text that identifies a CAK. Common Port : An instance of the MAC Internal Sublayer Service used by the SecY or PAC to provide transmission and reception of frames for both the Controlled and Uncontrolled Ports. Controlled Port : The access point used to provide the secure MAC Service to a client of a PAC or SecY. CP state machine : Controlled Port state machine is capable of controlling a SecY or a PAC. The CP supports interoperability with unauthenticated systems that are not port-based network access control capable, or that lack MKA. When the access controlled port is supported by a SecY, the CP is capable of controlling the SecY so as to provide unsecured connectivity to systems that implement a PAC. EAP : Extensible Authentication Protocol, RFC3748. EAPOL : EAP over LANs. KaY : Key Agreement Entity, a PAE entity responsible for MKA. Key Server : Elected by MKA, to transport a succession of SAKs, for use by MACsec, to the other member(s) of a CA. KMD : Key Management Domain, a string identifying systems that share cached CAKs. Listener : The role is to receive the network announcement parameters in the authentication process. Logon Process : The Logon Process is responsible for the managing the use of authentication credentials, for initiating use of the PAE's Supplicant and or Authenticator functionality, for deriving CAK, CKN tuples from PAE results, for maintaining PSKs (Pre-Sharing Keys), and for managing MKA instances. In the absence of successful authentication, key agreement, or support for MAC Security, the Logon Process determines whether the CP state machine should provide unauthenticated connectivity or authenticated but unsecured connectivity. MKA : MACsec Key Agreement protocol allows PAEs, each associated with a port that is an authenticated member of a secure connectivity association (CA) or a potential CA, to discover other PAEs attached to the same LAN, to confirm mutual possession of a CAK and hence to prove a past mutual authentication, to agree the secret keys (SAKs) used by MACsec for symmetric shared key cryptography, and to ensure that the data protected by MACsec has not been delayed. MKPDU : MACsec Key Agreement Protocol Data Unit. MPDU : MAC Protocol Data Unit. NID : Network Identity, a UTF-8 string identifying an network or network service. PAE : Port Access Entity, the protocol entity associated with a Port. It can support the protocol functionality associated with the Authenticator, the Supplicant, or both. PAC : Port Access Controller, a protocol-less shim that provides control over frame transmission and reception by clients attached to its Controlled Port, and uses the MAC Service provided by a Common Port. The access control decision is made by the PAE, typically taking into account the success or failure of mutual authentication and authorization of the PAE's peer(s), and is communicated by the PAE using the LMI to set the PAC's Controlled Port enabled/disable. Two different interfaces 'Controlled Port' and 'Uncontrolled Port', are associated with a PAC, and that for each instance of a PAC, two ifTable rows (one for each interface) run on top of an ifTable row representing the 'Common Port' interface, such as a row with ifType = 'ethernetCsmacd(6)'. For example : | | | | Controlled Port | Uncontrolled Port | | Interface | Interface | | (ifEntry = j) | (ifEntry = k) | | (ifType = | (ifType = | | macSecControlledIF(231)) | macSecUncontrolledIF(232))| | | | | | | | Physical Interface | | (ifEntry = i) | | (ifType = ethernetCsmacd(6)) | |_________________________________________________________| i, j, k are ifIndex to indicate an interface stack in the ifTable. Figure : PAC Interface Stack The 'Controlled Port' is the service point to provide one instance of the secure MAC service in a PAC. The 'Uncontrolled Port' is the service point to provide one instance of the insecure MAC service in a PAC. PACP : Port Access Controller Protocol. Port Identifier : A 16-bit number that is unique within the scope of the address of the port. Real Port : Indicates the PAE is for a real port. A port that is not created on demand by the mechanisms specified in this standard, but that can transmit and receive frames for one or more virtual ports. SC : Secure Channel, a security relationship used to provide security guarantees for frames transmitted from one member of a CA to the others. An SC is supported by a sequence of SAs thus allowing the periodic use of fresh keys without terminating the relationship. SA : Secure Association, a security relationship that provides security guarantees for frames transmitted from one member of a CA to the others. Each SA is supported by a single secret key, or a single set of keys where the cryptographic operations used to protect one frame require more than one key. SAK : Secure Association key, the secret key used by an SA. SCI : Secure Channel Identifier, a globally unique identifier for a secure channel, comprising a globally unique MAC Address and a Port Identifier, unique within the system allocated that address. secured connectivity : Data transfer between two or 'Controlled Ports' that is protected by MACsec. SecY : MAC Security Entity, the entity that operates the MAC Security protocol within a system. Supplicant : An entity at one end of a point-to-point LAN segment that seeks to be authenticated by an Authenticator attached to the other end of that link. Suspension: Temporary suspension of MKA operation to facilitate in-service control plane software upgrades without disrupting existing secure connectivity. Uncontrolled Port : The access point used to provide the insecure MAC Service to a client of a SecY or PAC. Virtual Port : Indicates the PAE is for a virtual port. A MAC Service or Internal Sublayer service access point that is created on demand. Virtual ports can be used to provide separate secure connectivity associations over the same LAN." REVISION "201404101619Z" DESCRIPTION "Update published as part of IEEE 802.1Xbx (Amendment to IEEE 802.1X-2010)" REVISION "200910011650Z" DESCRIPTION "Initial version of this MIB module. Published as part of IEEE P802.1X (Revision of IEEE Standard 802.1X-2009)" ::= { iso(1) iso-identified-organization(3) ieee(111) standards-association-numbered-series-standards(2) lan-man-stds(802) ieee802dot1(1) ieee802dot1mibs(1) 15 }

    Current Registration Authority (recovered by parent 1.3)

    Frank Farance

    Children (3)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.111.2.802.1.1.15.0 ieee8021XPaeMIBNotifications 0 0 None
    1.3.111.2.802.1.1.15.1 ieee8021XPaeMIBObjects 7 167 None
    1.3.111.2.802.1.1.15.2 ieee8021XPaeMIBConformance 2 15 None

    Brothers (24)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.111.2.802.1.1.1 ieee8021TcMib 0 0 Textual conventions used throughout the various IEEE 802.1 MIB
    modules.

    Unless otherwise indicated, the references in this MIB
    mod…
    1.3.111.2.802.1.1.2 ieee8021BridgeMib 3 136 The Bridge MIB module for managing devices that support
    IEEE 802.1D. This MIB module is derived from the IETF
    BRIDGE-MIB, RFC 41…
    1.3.111.2.802.1.1.3 ieee8021SpanningTreeMib 3 56 ieee8021SpanningTreeMib MODULE-IDENTITY
    LAST-UPDATED "201103240000Z" -- March 24, 2011
    ORGANIZATION "IEEE 802.1 Working Group"
    1.3.111.2.802.1.1.4 ieee8021QBridgeMib 2 160 The VLAN Bridge MIB module for managing Virtual Bridged
    Local Area Networks, as defined by IEEE 802.1Q-2005,
    including Restricted…
    1.3.111.2.802.1.1.5 ieee8021PbMib 3 64 ieee8021PbMib MODULE-IDENTITY
    LAST-UPDATED "201202100000Z" -- February 10, 2012
    ORGANIZATION "IEEE 802.1 Working Group"
    CONTACT…
    1.3.111.2.802.1.1.6 ieee8021MstpMib 3 111 ieee8021MstpMib MODULE-IDENTITY
    LAST-UPDATED "201208100000Z" -- August 10, 2012
    ORGANIZATION "IEEE 802.1 Working Group"
    CONTACT…
    1.3.111.2.802.1.1.7 ieee8021CfmV2Mib 0 0 IEEE8021-CFM-V2-MIB
    1.3.111.2.802.1.1.8 ieee8021CfmMib 3 229 None
    1.3.111.2.802.1.1.9 ieee8021PbbMib 3 88 ieee8021PbbMib MODULE-IDENTITY
    LAST-UPDATED "201102270000Z" -- February 27, 2011
    ORGANIZATION "IEEE 802.1 Working Group"
    CONTAC…
    1.3.111.2.802.1.1.10 ieee8021PbbTeMib 3 58 ieee8021PbbTeMib MODULE-IDENTITY
    LAST-UPDATED "201102270000Z" -- February 27, 2011
    ORGANIZATION "IEEE 802.1 Working Group"
    CONT…
    1.3.111.2.802.1.1.11 ieee8021DdcfmMIB 2 75 ieee8021DdcfmMIB MODULE-IDENTITY
    LAST-UPDATED "201102270000Z" -- February 27, 2011
    ORGANIZATION "IEEE 802.1 Working Group"
    CONT…
    1.3.111.2.802.1.1.12 ieee8021LldpV2TcMIB, lldpV2TcMIB 0 0 Textual conventions used throughout the IEEE Std 802.1AB
    version 2 and later MIB modules.
    Unless otherwise indicated, the referen…
    1.3.111.2.802.1.1.13 ieee8021LldpV2MIB, lldpV2MIB 3 194 Management Information Base module for LLDP configuration,
    statistics, local system data and remote systems data
    components.
    This …
    1.3.111.2.802.1.1.14 ieee8021TpmrMib 3 54 ieee8021TpmrMib MODULE-IDENTITY
    LAST-UPDATED "201102270000Z" -- February 27, 2011
    ORGANIZATION "IEEE 802.1 Working Group"
    CONTA…
    1.3.111.2.802.1.1.16 ieee8021FqtssMib 3 29 ieee8021FqtssMib MODULE-IDENTITY
    LAST-UPDATED "201102270000Z" -- February 27, 2011
    ORGANIZATION "IEEE 802.1 Working Group"
    CONT…
    1.3.111.2.802.1.1.17 ieee8021DevIDMIB 3 39 ieee8021DevIDMIB MODULE-IDENTITY
    LAST-UPDATED "200906250000Z"
    ORGANIZATION "IEEE 802.1 Working Group"
    DESCRIPTION
    "This is the …
    1.3.111.2.802.1.1.18 ieee8021CnMib 2 96 ieee8021CnMib MODULE-IDENTITY
    LAST-UPDATED "201102270000Z" -- February 27, 2011
    ORGANIZATION "IEEE 802.1 Working Group"
    CONTACT…
    1.3.111.2.802.1.1.19 ieee8021SrpMib 3 49 ieee8021SrpMib MODULE-IDENTITY
    LAST-UPDATED "201102270000Z" -- February 27, 2011
    ORGANIZATION "IEEE 802.1 Working Group"
    CONTAC…
    1.3.111.2.802.1.1.20 ieee8021AsTimeSyncMib 2 132 ieee8021AsTimeSyncMib MODULE-IDENTITY
    LAST-UPDATED "201011110000Z" -- November 11, 2010
    ORGANIZATION "IEEE 802.1 Working Group"…
    1.3.111.2.802.1.1.21 ieee8021PFCMib 2 11 ieee8021PFCMib MODULE-IDENTITY
    LAST-UPDATED "201002080000Z" -- 02/08/2010 00:00GMT
    ORGANIZATION "IEEE 802.1 Working Group"
    CONT…
    1.3.111.2.802.1.1.22 ieee8021MvrpxMib 2 11 ieee8021MvrpxMib MODULE-IDENTITY
    LAST-UPDATED "201104050000Z" -- (YYYYMMDDHHMM Zulu=GMT)
    ORGANIZATION "IEEE 802.1 Working Group…
    1.3.111.2.802.1.1.23 ieee8021MirpMib 2 9 ieee8021MirpMib MODULE-IDENTITY
    LAST-UPDATED "201104050000Z" -- (YYYYMMDDHHMM Zulu=GMT)
    ORGANIZATION "IEEE 802.1 Working Group"…
    1.3.111.2.802.1.1.24 ieee8021BridgeEvbMib 3 152 ieee8021BridgeEvbMib MODULE-IDENTITY
    LAST-UPDATED "201202150000Z" -- February 15, 2012
    ORGANIZATION "IEEE 802.1 Working Group"
    1.3.111.2.802.1.1.25 ieee8021BridgePEMib 3 38 ieee8021BridgePEMib MODULE-IDENTITY
    LAST-UPDATED "201201220000Z" -- January 22, 2012, 0000Z
    ORGANIZATION "IEEE 802.1 Working Gr…