Reference record for OID 1.3.6.1.6.3.15.1.2.2


parent
1.3.6.1.6.3.15.1.2 (usmUser)
node code
2
node name
usmUserTable
dot oid
1.3.6.1.6.3.15.1.2.2
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpUsmMIB(15) usmMIBObjects(1) usmUser(2) usmUserTable(2)}
  • {iso(1) org(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpUsmMIB(15) usmMIBObjects(1) usmUser(2) usmUserTable(2)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpUsmMIB(15) usmMIBObjects(1) usmUser(2) usmUserTable(2)}
  • iri oid
  • /iso/identified-organization/dod/internet/snmpV2/snmpModules/snmpUsmMIB/usmMIBObjects/usmUser/usmUserTable
  • /iso/org/dod/internet/snmpV2/snmpModules/snmpUsmMIB/usmMIBObjects/usmUser/usmUserTable
  • /iso/iso-identified-organization/dod/internet/snmpV2/snmpModules/snmpUsmMIB/usmMIBObjects/usmUser/usmUserTable
  • iri by oid_info
    /ISO/Identified-Organization/6/1/6/3/15/1/2/2

    Description by circitor

    The table of users configured in the SNMP engine's
    Local Configuration Datastore (LCD).

    To create a new user (i.e., to instantiate a new
    conceptual row in this table), it is recommended to
    follow this procedure:

    1) GET(usmUserSpinLock.0) and save in sValue.

    2) SET(usmUserSpinLock.0=sValue,
    usmUserCloneFrom=templateUser,
    usmUserStatus=createAndWait)
    You should use a template user to clone from
    which has the proper auth/priv protocol defined.

    If the new user is to use privacy:

    3) generate the keyChange value based on the secret
    privKey of the clone-from user and the secret key
    to be used for the new user. Let us call this
    pkcValue.
    4) GET(usmUserSpinLock.0) and save in sValue.
    5) SET(usmUserSpinLock.0=sValue,
    usmUserPrivKeyChange=pkcValue
    usmUserPublic=randomValue1)
    6) GET(usmUserPulic) and check it has randomValue1.
    If not, repeat steps 4-6.

    If the new user will never use privacy:

    7) SET(usmUserPrivProtocol=usmNoPrivProtocol)

    If the new user is to use authentication:

    8) generate the keyChange value based on the secret
    authKey of the clone-from user and the secret key
    to be used for the new user. Let us call this
    akcValue.
    9) GET(usmUserSpinLock.0) and save in sValue.
    10) SET(usmUserSpinLock.0=sValue,
    usmUserAuthKeyChange=akcValue
    usmUserPublic=randomValue2)
    11) GET(usmUserPulic) and check it has randomValue2.
    If not, repeat steps 9-11.

    If the new user will never use authentication:

    12) SET(usmUserAuthProtocol=usmNoAuthProtocol)

    Finally, activate the new user:

    13) SET(usmUserStatus=active)

    The new user should now be available and ready to be
    used for SNMPv3 communication. Note however that access
    to MIB data must be provided via configuration of the
    SNMP-VIEW-BASED-ACM-MIB.

    The use of usmUserSpinlock is to avoid conflicts with
    another SNMP command generator application which may
    also be acting on the usmUserTable.

    Parsed from file SNMP-USER-BASED-SM-MIB.mib
    Module: SNMP-USER-BASED-SM-MIB

    Description by cisco_v1

    The table of users configured in the SNMP engine's
    Local Configuration Datastore (LCD).

    To create a new user (i.e., to instantiate a new
    conceptual row in this table), it is recommended to
    follow this procedure:

    1) GET(usmUserSpinLock.0) and save in sValue.
    2) SET(usmUserSpinLock.0=sValue,
    usmUserCloneFrom=templateUser,
    usmUserStatus=createAndWait)
    You should use a template user to clone from
    which has the proper auth/priv protocol defined.

    If the new user is to use privacy:

    3) generate the keyChange value based on the secret
    privKey of the clone-from user and the secret key
    to be used for the new user. Let us call this
    pkcValue.
    4) GET(usmUserSpinLock.0) and save in sValue.
    5) SET(usmUserSpinLock.0=sValue,
    usmUserPrivKeyChange=pkcValue
    usmUserPublic=randomValue1)
    6) GET(usmUserPulic) and check it has randomValue1.
    If not, repeat steps 4-6.

    If the new user will never use privacy:






    7) SET(usmUserPrivProtocol=usmNoPrivProtocol)

    If the new user is to use authentication:

    8) generate the keyChange value based on the secret
    authKey of the clone-from user and the secret key
    to be used for the new user. Let us call this
    akcValue.
    9) GET(usmUserSpinLock.0) and save in sValue.
    10) SET(usmUserSpinLock.0=sValue,
    usmUserAuthKeyChange=akcValue
    usmUserPublic=randomValue2)
    11) GET(usmUserPulic) and check it has randomValue2.
    If not, repeat steps 9-11.

    If the new user will never use authentication:

    12) SET(usmUserAuthProtocol=usmNoAuthProtocol)

    Finally, activate the new user:

    13) SET(usmUserStatus=active)

    The new user should now be available and ready to be
    used for SNMPv3 communication. Note however that access
    to MIB data must be provided via configuration of the
    SNMP-VIEW-BASED-ACM-MIB.

    The use of usmUserSpinlock is to avoid conflicts with
    another SNMP command responder application which may
    also be acting on the usmUserTable.

    Description by oid_info

    usmUserTable OBJECT-TYPE
    SYNTAX SEQUENCE OF UsmUserEntry
    MAX-ACCESS not-accessible
    STATUS current
    DESCRIPTION "The table of users configured in the SNMP engines
    Local Configuration Datastore (LCD).
    To create a new user (i.e., to instantiate a new
    conceptual row in this table), it is recommended to
    follow this procedure:
    1) GET(usmUserSpinLock.0) and save in sValue.
    2) SET(usmUserSpinLock.0=sValue,
    usmUserCloneFrom=templateUser,
    usmUserStatus=createAndWait)
    You should use a template user to clone from
    which has the proper auth/priv protocol defined.
    If the new user is to use privacy:
    3) generate the keyChange value based on the secret
    privKey of the clone-from user and the secret key
    to be used for the new user. Let us call this
    pkcValue.
    4) GET(usmUserSpinLock.0) and save in sValue.
    5) SET(usmUserSpinLock.0=sValue,
    usmUserPrivKeyChange=pkcValue
    usmUserPublic=randomValue1)
    6) GET(usmUserPulic) and check it has randomValue1.
    If not, repeat steps 4-6.
    If the new user will never use privacy:
    7) SET(usmUserPrivProtocol=usmNoPrivProtocol)
    If the new user is to use authentication:
    8) generate the keyChange value based on the secret
    authKey of the clone-from user and the secret key
    to be used for the new user. Let us call this
    akcValue.
    9) GET(usmUserSpinLock.0) and save in sValue.
    10) SET(usmUserSpinLock.0=sValue,
    usmUserAuthKeyChange=akcValue
    usmUserPublic=randomValue2)
    11) GET(usmUserPulic) and check it has randomValue2.
    If not, repeat steps 9-11.
    If the new user will never use authentication:
    12) SET(usmUserAuthProtocol=usmNoAuthProtocol)
    Finally, activate the new user:
    13) SET(usmUserStatus=active)
    The new user should now be available and ready to be
    used for SNMPv3 communication. Note however that access
    to MIB data must be provided via configuration of the
    SNMP-VIEW-BASED-ACM-MIB.
    The use of usmUserSpinlock is to avoid conflicts with
    another SNMP command generator application which may
    also be acting on the usmUserTable.
    "

    View at oid-info.com

    Description by mibdepot

    The table of users configured in the SNMP engine's
    Local Configuration Datastore (LCD).

    To create a new user (i.e., to instantiate a new
    conceptual row in this table), it is recommended to
    follow this procedure:

    1) GET(usmUserSpinLock.0) and save in sValue.
    2) SET(usmUserSpinLock.0=sValue,
    usmUserCloneFrom=templateUser,
    usmUserStatus=createAndWait)
    You should use a template user to clone from
    which has the proper auth/priv protocol defined.

    If the new user is to use privacy:

    3) generate the keyChange value based on the secret
    privKey of the clone-from user and the secret key
    to be used for the new user. Let us call this
    pkcValue.
    4) GET(usmUserSpinLock.0) and save in sValue.
    5) SET(usmUserSpinLock.0=sValue,
    usmUserPrivKeyChange=pkcValue
    usmUserPublic=randomValue1)
    6) GET(usmUserPulic) and check it has randomValue1.
    If not, repeat steps 4-6.

    If the new user will never use privacy:

    7) SET(usmUserPrivProtocol=usmNoPrivProtocol)

    If the new user is to use authentication:

    8) generate the keyChange value based on the secret
    authKey of the clone-from user and the secret key
    to be used for the new user. Let us call this
    akcValue.
    9) GET(usmUserSpinLock.0) and save in sValue.
    10) SET(usmUserSpinLock.0=sValue,
    usmUserAuthKeyChange=akcValue
    usmUserPublic=randomValue2)
    11) GET(usmUserPulic) and check it has randomValue2.
    If not, repeat steps 9-11.

    If the new user will never use authentication:

    12) SET(usmUserAuthProtocol=usmNoAuthProtocol)

    Finally, activate the new user:

    13) SET(usmUserStatus=active)

    The new user should now be available and ready to be
    used for SNMPv3 communication. Note however that access
    to MIB data must be provided via configuration of the
    SNMP-VIEW-BASED-ACM-MIB.
    The use of usmUserSpinlock is to avoid conflicts with
    another SNMP command generator application which may
    also be acting on the usmUserTable.

    Parsed from file rfc3414.mib.txt
    Company: None
    Module: SNMP-USER-BASED-SM-MIB

    Description by cisco

    The table of users configured in the SNMP engine's
    Local Configuration Datastore (LCD).

    To create a new user (i.e., to instantiate a new
    conceptual row in this table), it is recommended to
    follow this procedure:

    1) GET(usmUserSpinLock.0) and save in sValue.
    2) SET(usmUserSpinLock.0=sValue,
    usmUserCloneFrom=templateUser,
    usmUserStatus=createAndWait)
    You should use a template user to clone from
    which has the proper auth/priv protocol defined.

    If the new user is to use privacy:

    3) generate the keyChange value based on the secret
    privKey of the clone-from user and the secret key
    to be used for the new user. Let us call this
    pkcValue.
    4) GET(usmUserSpinLock.0) and save in sValue.
    5) SET(usmUserSpinLock.0=sValue,
    usmUserPrivKeyChange=pkcValue
    usmUserPublic=randomValue1)
    6) GET(usmUserPulic) and check it has randomValue1.
    If not, repeat steps 4-6.

    If the new user will never use privacy:






    7) SET(usmUserPrivProtocol=usmNoPrivProtocol)

    If the new user is to use authentication:

    8) generate the keyChange value based on the secret
    authKey of the clone-from user and the secret key
    to be used for the new user. Let us call this
    akcValue.
    9) GET(usmUserSpinLock.0) and save in sValue.
    10) SET(usmUserSpinLock.0=sValue,
    usmUserAuthKeyChange=akcValue
    usmUserPublic=randomValue2)
    11) GET(usmUserPulic) and check it has randomValue2.
    If not, repeat steps 9-11.

    If the new user will never use authentication:

    12) SET(usmUserAuthProtocol=usmNoAuthProtocol)

    Finally, activate the new user:

    13) SET(usmUserStatus=active)

    The new user should now be available and ready to be
    used for SNMPv3 communication. Note however that access
    to MIB data must be provided via configuration of the
    SNMP-VIEW-BASED-ACM-MIB.

    The use of usmUserSpinlock is to avoid conflicts with
    another SNMP command responder application which may
    also be acting on the usmUserTable.

    Information by circitor

    usmUserTable OBJECT-TYPE SYNTAX SEQUENCE OF UsmUserEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The table of users configured in the SNMP engine's Local Configuration Datastore (LCD). To create a new user (i.e., to instantiate a new conceptual row in this table), it is recommended to follow this procedure: 1) GET(usmUserSpinLock.0) and save in sValue. 2) SET(usmUserSpinLock.0=sValue, usmUserCloneFrom=templateUser, usmUserStatus=createAndWait) You should use a template user to clone from which has the proper auth/priv protocol defined. If the new user is to use privacy: 3) generate the keyChange value based on the secret privKey of the clone-from user and the secret key to be used for the new user. Let us call this pkcValue. 4) GET(usmUserSpinLock.0) and save in sValue. 5) SET(usmUserSpinLock.0=sValue, usmUserPrivKeyChange=pkcValue usmUserPublic=randomValue1) 6) GET(usmUserPulic) and check it has randomValue1. If not, repeat steps 4-6. If the new user will never use privacy: 7) SET(usmUserPrivProtocol=usmNoPrivProtocol) If the new user is to use authentication: 8) generate the keyChange value based on the secret authKey of the clone-from user and the secret key to be used for the new user. Let us call this akcValue. 9) GET(usmUserSpinLock.0) and save in sValue. 10) SET(usmUserSpinLock.0=sValue, usmUserAuthKeyChange=akcValue usmUserPublic=randomValue2) 11) GET(usmUserPulic) and check it has randomValue2. If not, repeat steps 9-11. If the new user will never use authentication: 12) SET(usmUserAuthProtocol=usmNoAuthProtocol) Finally, activate the new user: 13) SET(usmUserStatus=active) The new user should now be available and ready to be used for SNMPv3 communication. Note however that access to MIB data must be provided via configuration of the SNMP-VIEW-BASED-ACM-MIB. The use of usmUserSpinlock is to avoid conflicts with another SNMP command generator application which may also be acting on the usmUserTable. " ::= { usmUser 2 }

    Information by cisco_v1

    usmUserTable OBJECT-TYPE SYNTAX SEQUENCE OF UsmUserEntry ACCESS not-accessible STATUS mandatory DESCRIPTION "The table of users configured in the SNMP engine's Local Configuration Datastore (LCD). To create a new user (i.e., to instantiate a new conceptual row in this table), it is recommended to follow this procedure: 1) GET(usmUserSpinLock.0) and save in sValue. 2) SET(usmUserSpinLock.0=sValue, usmUserCloneFrom=templateUser, usmUserStatus=createAndWait) You should use a template user to clone from which has the proper auth/priv protocol defined. If the new user is to use privacy: 3) generate the keyChange value based on the secret privKey of the clone-from user and the secret key to be used for the new user. Let us call this pkcValue. 4) GET(usmUserSpinLock.0) and save in sValue. 5) SET(usmUserSpinLock.0=sValue, usmUserPrivKeyChange=pkcValue usmUserPublic=randomValue1) 6) GET(usmUserPulic) and check it has randomValue1. If not, repeat steps 4-6. If the new user will never use privacy: 7) SET(usmUserPrivProtocol=usmNoPrivProtocol) If the new user is to use authentication: 8) generate the keyChange value based on the secret authKey of the clone-from user and the secret key to be used for the new user. Let us call this akcValue. 9) GET(usmUserSpinLock.0) and save in sValue. 10) SET(usmUserSpinLock.0=sValue, usmUserAuthKeyChange=akcValue usmUserPublic=randomValue2) 11) GET(usmUserPulic) and check it has randomValue2. If not, repeat steps 9-11. If the new user will never use authentication: 12) SET(usmUserAuthProtocol=usmNoAuthProtocol) Finally, activate the new user: 13) SET(usmUserStatus=active) The new user should now be available and ready to be used for SNMPv3 communication. Note however that access to MIB data must be provided via configuration of the SNMP-VIEW-BASED-ACM-MIB. The use of usmUserSpinlock is to avoid conflicts with another SNMP command responder application which may also be acting on the usmUserTable." ::= { usmUser 2 }

    Information by oid_info

    Automatically extracted from RFC3414

    Information by mibdepot

    usmUserTable OBJECT-TYPE SYNTAX SEQUENCE OF UsmUserEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The table of users configured in the SNMP engine's Local Configuration Datastore (LCD). To create a new user (i.e., to instantiate a new conceptual row in this table), it is recommended to follow this procedure: 1) GET(usmUserSpinLock.0) and save in sValue. 2) SET(usmUserSpinLock.0=sValue, usmUserCloneFrom=templateUser, usmUserStatus=createAndWait) You should use a template user to clone from which has the proper auth/priv protocol defined. If the new user is to use privacy: 3) generate the keyChange value based on the secret privKey of the clone-from user and the secret key to be used for the new user. Let us call this pkcValue. 4) GET(usmUserSpinLock.0) and save in sValue. 5) SET(usmUserSpinLock.0=sValue, usmUserPrivKeyChange=pkcValue usmUserPublic=randomValue1) 6) GET(usmUserPulic) and check it has randomValue1. If not, repeat steps 4-6. If the new user will never use privacy: 7) SET(usmUserPrivProtocol=usmNoPrivProtocol) If the new user is to use authentication: 8) generate the keyChange value based on the secret authKey of the clone-from user and the secret key to be used for the new user. Let us call this akcValue. 9) GET(usmUserSpinLock.0) and save in sValue. 10) SET(usmUserSpinLock.0=sValue, usmUserAuthKeyChange=akcValue usmUserPublic=randomValue2) 11) GET(usmUserPulic) and check it has randomValue2. If not, repeat steps 9-11. If the new user will never use authentication: 12) SET(usmUserAuthProtocol=usmNoAuthProtocol) Finally, activate the new user: 13) SET(usmUserStatus=active) The new user should now be available and ready to be used for SNMPv3 communication. Note however that access to MIB data must be provided via configuration of the SNMP-VIEW-BASED-ACM-MIB. The use of usmUserSpinlock is to avoid conflicts with another SNMP command generator application which may also be acting on the usmUserTable. " ::= { usmUser 2 }

    Information by cisco

    usmUserTable OBJECT-TYPE SYNTAX SEQUENCE OF UsmUserEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The table of users configured in the SNMP engine's Local Configuration Datastore (LCD). To create a new user (i.e., to instantiate a new conceptual row in this table), it is recommended to follow this procedure: 1) GET(usmUserSpinLock.0) and save in sValue. 2) SET(usmUserSpinLock.0=sValue, usmUserCloneFrom=templateUser, usmUserStatus=createAndWait) You should use a template user to clone from which has the proper auth/priv protocol defined. If the new user is to use privacy: 3) generate the keyChange value based on the secret privKey of the clone-from user and the secret key to be used for the new user. Let us call this pkcValue. 4) GET(usmUserSpinLock.0) and save in sValue. 5) SET(usmUserSpinLock.0=sValue, usmUserPrivKeyChange=pkcValue usmUserPublic=randomValue1) 6) GET(usmUserPulic) and check it has randomValue1. If not, repeat steps 4-6. If the new user will never use privacy: 7) SET(usmUserPrivProtocol=usmNoPrivProtocol) If the new user is to use authentication: 8) generate the keyChange value based on the secret authKey of the clone-from user and the secret key to be used for the new user. Let us call this akcValue. 9) GET(usmUserSpinLock.0) and save in sValue. 10) SET(usmUserSpinLock.0=sValue, usmUserAuthKeyChange=akcValue usmUserPublic=randomValue2) 11) GET(usmUserPulic) and check it has randomValue2. If not, repeat steps 9-11. If the new user will never use authentication: 12) SET(usmUserAuthProtocol=usmNoAuthProtocol) Finally, activate the new user: 13) SET(usmUserStatus=active) The new user should now be available and ready to be used for SNMPv3 communication. Note however that access to MIB data must be provided via configuration of the SNMP-VIEW-BASED-ACM-MIB. The use of usmUserSpinlock is to avoid conflicts with another SNMP command responder application which may also be acting on the usmUserTable. " ::= { usmUser 2 }

    First Registration Authority (recovered by parent 1.3.6)

    Defense Communication Agency

    Current Registration Authority (recovered by parent 1.3.6)

    US DoD

    Children (1)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.6.3.15.1.2.2.1 usmUserEntry 13 13 A user configured in the SNMP engine's Local
    Configuration Datastore (LCD) for the User-based
    Security Model.

    Brothers (1)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.6.3.15.1.2.1 usmUserSpinLock 1 1 An advisory lock used to allow several cooperating
    Command Generator Applications to coordinate their
    use of facilities to alter …