The type of keystore employed by the device.
'hardwareKeystore' - Keystore functionality is implemented
in hardware.
'softwareEmulation' - Keystore functionality is emulated
in software.
Parsed from file CISCO-TRUSTSEC-MIB.mib
Module: CISCO-TRUSTSEC-MIB
This object indicates the type of keystore employed
by the device.
'hardwareKeystore' - Keystore functionality is implemented
in hardware.
'softwareEmulation' - Keystore functionality is emulated
in software.
This object indicates the type of keystore employed
by the device.
'hardwareKeystore' - Keystore functionality is implemented
in hardware.
'softwareEmulation' - Keystore functionality is emulated
in software.
Parsed from file CISCO-TRUSTSEC-MIB.my.txt
Company: None
Module: CISCO-TRUSTSEC-MIB
This object indicates the type of keystore employed
by the device.
'hardwareKeystore' - Keystore functionality is implemented
in hardware.
'softwareEmulation' - Keystore functionality is emulated
in software.
ctsKeystoreType OBJECT-TYPE SYNTAX INTEGER { hardwareKeystore(1), softwareEmulation(2) } MAX-ACCESS read-only STATUS current DESCRIPTION "The type of keystore employed by the device. 'hardwareKeystore' - Keystore functionality is implemented in hardware. 'softwareEmulation' - Keystore functionality is emulated in software." ::= { ctsCredentialObjects 4 }
ctsKeystoreType OBJECT-TYPE SYNTAX INTEGER { hardwareKeystore(1), softwareEmulation(2) } ACCESS read-only STATUS mandatory DESCRIPTION "This object indicates the type of keystore employed by the device. 'hardwareKeystore' - Keystore functionality is implemented in hardware. 'softwareEmulation' - Keystore functionality is emulated in software." ::= { ctsCredentialObjects 4 }
Vendor: Cisco
Module: CISCO-TRUSTSEC-MIB
[Automatically extracted from oidview.com]
ctsKeystoreType OBJECT-TYPE SYNTAX INTEGER { hardwareKeystore(1), softwareEmulation(2) } MAX-ACCESS read-only STATUS current DESCRIPTION "This object indicates the type of keystore employed by the device. 'hardwareKeystore' - Keystore functionality is implemented in hardware. 'softwareEmulation' - Keystore functionality is emulated in software." ::= { ctsCredentialObjects 4 }
ctsKeystoreType OBJECT-TYPE SYNTAX INTEGER { hardwareKeystore(1), softwareEmulation(2) } MAX-ACCESS read-only STATUS current DESCRIPTION "This object indicates the type of keystore employed by the device. 'hardwareKeystore' - Keystore functionality is implemented in hardware. 'softwareEmulation' - Keystore functionality is emulated in software." ::= { ctsCredentialObjects 4 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.9.9.730.1.3.4.0 | ctsKeystoreType | 0 | 0 | None |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.9.9.730.1.3.1 | ctsDeviceId | 1 | 1 | This object allows user to specify the identifier for the device. This identifier and the device password (specified by ctsDeviceP… |
1.3.6.1.4.1.9.9.730.1.3.2 | ctsDevicePasswordType | 1 | 1 | This object specifies the type of encryption employed to encrypt password in ctsDevicePassword object. Value for this object must… |
1.3.6.1.4.1.9.9.730.1.3.3 | ctsDevicePassword | 1 | 1 | This object allows user to specify the password for the device. This password and the device identifier (specified by ctsDeviceId)… |
1.3.6.1.4.1.9.9.730.1.3.5 | ctsKeystoreFwVersion | 1 | 1 | The firmware version of hardware keystore. This object is only instantiated when the value of ctsKeystoreType is 'hardwareKeystor… |
1.3.6.1.4.1.9.9.730.1.3.6 | ctsKeystoreFwAlerts | 1 | 1 | The number of hardware keystore alerts occurred. This object is only instantiated when the value of ctsKeystoreType is 'hardwareK… |
1.3.6.1.4.1.9.9.730.1.3.7 | ctsKeystoreFwResets | 1 | 1 | The number of times keystore firmware was reset. This object is only instantiated when the value of ctsKeystoreType is 'hardwareK… |
1.3.6.1.4.1.9.9.730.1.3.8 | ctsKeystoreRxTimeouts | 1 | 1 | The number of times the system timed out awaiting response from keystore firmware. This object is only instantiated when the valu… |
1.3.6.1.4.1.9.9.730.1.3.9 | ctsKeystoreRxBadChecksums | 1 | 1 | The number of message fragments the system received from keystore firmware that had bad checksum value. This object is only insta… |
1.3.6.1.4.1.9.9.730.1.3.10 | ctsKeystoreRxBadFragmentLengths | 1 | 1 | The number of message fragments the system received from keystore firmware that had illegal lengths. This object is only instanti… |
1.3.6.1.4.1.9.9.730.1.3.11 | ctsKeystoreCorruptions | 1 | 1 | The number of times keystore firmware reported detection of one or more corrupted records in the hardware keystore. This object i… |
1.3.6.1.4.1.9.9.730.1.3.13 | ctsKeystorePasswordRecordTable | 1 | 3 | A list of Cisco Trusted Security password records stored in the hardware or software keystore of this device. |
1.3.6.1.4.1.9.9.730.1.3.14 | ctsKeystorePacRecordTable | 1 | 3 | A list of Cisco Trusted Security PAC records stored in the hardware or software keystore of this device. |
1.3.6.1.4.1.9.9.730.1.3.15 | ctsPacInfoTable | 1 | 7 | A list of PACs on this device. |
1.3.6.1.4.1.9.9.730.1.3.16 | ctsCredentialsClearAll | 1 | 1 | This object allows user to clear all the PACs and Cisco Trusted Security credentials on the device. Setting the object to 'true' … |