Reference record for OID 1.3.6.1.6.3.15.1.2.2.1.12



parent
1.3.6.1.6.3.15.1.2.2.1 (usmUserEntry)
node code
12
node name
usmUserStorageType
dot oid
1.3.6.1.6.3.15.1.2.2.1.12
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpUsmMIB(15) usmMIBObjects(1) usmUser(2) usmUserTable(2) usmUserEntry(1) usmUserStorageType(12)}
  • {iso(1) org(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpUsmMIB(15) usmMIBObjects(1) usmUser(2) usmUserTable(2) usmUserEntry(1) usmUserStorageType(12)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpUsmMIB(15) usmMIBObjects(1) usmUser(2) usmUserTable(2) usmUserEntry(1) usmUserStorageType(12)}
  • iri oid
  • /iso/identified-organization/dod/internet/snmpV2/snmpModules/snmpUsmMIB/usmMIBObjects/usmUser/usmUserTable/usmUserEntry/usmUserStorageType
  • /iso/org/dod/internet/snmpV2/snmpModules/snmpUsmMIB/usmMIBObjects/usmUser/usmUserTable/usmUserEntry/usmUserStorageType
  • /iso/iso-identified-organization/dod/internet/snmpV2/snmpModules/snmpUsmMIB/usmMIBObjects/usmUser/usmUserTable/usmUserEntry/usmUserStorageType
  • iri by oid_info
    /ISO/Identified-Organization/6/1/6/3/15/1/2/2/1/12

    Description by circitor

    The storage type for this conceptual row.

    Conceptual rows having the value 'permanent' must
    allow write-access at a minimum to:

    - usmUserAuthKeyChange, usmUserOwnAuthKeyChange
    and usmUserPublic for a user who employs
    authentication, and
    - usmUserPrivKeyChange, usmUserOwnPrivKeyChange
    and usmUserPublic for a user who employs
    privacy.

    Note that any user who employs authentication or
    privacy must allow its secret(s) to be updated and
    thus cannot be 'readOnly'.

    If an initial set operation tries to set the value to
    'readOnly' for a user who employs authentication or
    privacy, then an 'inconsistentValue' error must be
    returned. Note that if the value has been previously
    set (implicit or explicit) to any value, then the rules
    as defined in the StorageType Textual Convention apply.

    It is an implementation issue to decide if a SET for
    a readOnly or permanent row is accepted at all. In some
    contexts this may make sense, in others it may not. If
    a SET for a readOnly or permanent row is not accepted
    at all, then a 'wrongValue' error must be returned.

    Parsed from file SNMP-USER-BASED-SM-MIB.mib
    Module: SNMP-USER-BASED-SM-MIB

    Description by cisco_v1

    The storage type for this conceptual row.

    Conceptual rows having the value 'permanent' must
    allow write-access at a minimum to:

    - usmUserAuthKeyChange, usmUserOwnAuthKeyChange
    and usmUserPublic for a user who employs
    authentication, and
    - usmUserPrivKeyChange, usmUserOwnPrivKeyChange
    and usmUserPublic for a user who employs
    privacy.

    Note that any user who employs authentication or
    privacy must allow its secret(s) to be updated and
    thus cannot be 'readOnly'.

    If an initial set operation tries to set the value to
    'readOnly' for a user who employs authentication or
    privacy, then an 'inconsistentValue' error must be
    returned. Note that if the value has been previously
    set (implicit or explicit) to any value, then the rules
    as defined in the StorageType Textual Convention apply.

    It is an implementation issue to decide if a SET for
    a readOnly or permanent row is accepted at all. In some
    contexts this may make sense, in others it may not. If
    a SET for a readOnly or permanent row is not accepted
    at all, then a 'wrongValue' error must be returned.

    Description by oid_info

    usmUserStorageType OBJECT-TYPE
    SYNTAX StorageType
    MAX-ACCESS read-create
    STATUS current
    DESCRIPTION "The storage type for this conceptual row.
    Conceptual rows having the value permanent must
    allow write-access at a minimum to:
    - usmUserAuthKeyChange, usmUserOwnAuthKeyChange
    and usmUserPublic for a user who employs
    authentication, and
    - usmUserPrivKeyChange, usmUserOwnPrivKeyChange
    and usmUserPublic for a user who employs
    privacy.
    Note that any user who employs authentication or
    privacy must allow its secret(s) to be updated and
    thus cannot be
    eadOnly.
    If an initial set operation tries to set the value to

    eadOnly for a user who employs authentication or
    privacy, then an inconsistentValue error must be
    returned. Note that if the value has been previously
    set (implicit or explicit) to any value, then the rules
    as defined in the StorageType Textual Convention apply.
    It is an implementation issue to decide if a SET for
    a readOnly or permanent row is accepted at all. In some
    contexts this may make sense, in others it may not. If
    a SET for a readOnly or permanent row is not accepted
    at all, then a wrongValue error must be returned.
    "
    DEFVAL { nonVolatile }

    View at oid-info.com

    Description by mibdepot

    The storage type for this conceptual row.

    Conceptual rows having the value 'permanent' must
    allow write-access at a minimum to:

    - usmUserAuthKeyChange, usmUserOwnAuthKeyChange
    and usmUserPublic for a user who employs
    authentication, and
    - usmUserPrivKeyChange, usmUserOwnPrivKeyChange
    and usmUserPublic for a user who employs
    privacy.
    Note that any user who employs authentication or
    privacy must allow its secret(s) to be updated and
    thus cannot be 'readOnly'.

    If an initial set operation tries to set the value to
    'readOnly' for a user who employs authentication or
    privacy, then an 'inconsistentValue' error must be
    returned. Note that if the value has been previously
    set (implicit or explicit) to any value, then the rules
    as defined in the StorageType Textual Convention apply.

    It is an implementation issue to decide if a SET for
    a readOnly or permanent row is accepted at all. In some
    contexts this may make sense, in others it may not. If
    a SET for a readOnly or permanent row is not accepted
    at all, then a 'wrongValue' error must be returned.

    Parsed from file rfc3414.mib.txt
    Company: None
    Module: SNMP-USER-BASED-SM-MIB

    Description by cisco

    The storage type for this conceptual row.

    Conceptual rows having the value 'permanent' must
    allow write-access at a minimum to:

    - usmUserAuthKeyChange, usmUserOwnAuthKeyChange
    and usmUserPublic for a user who employs
    authentication, and
    - usmUserPrivKeyChange, usmUserOwnPrivKeyChange
    and usmUserPublic for a user who employs
    privacy.

    Note that any user who employs authentication or
    privacy must allow its secret(s) to be updated and
    thus cannot be 'readOnly'.

    If an initial set operation tries to set the value to
    'readOnly' for a user who employs authentication or
    privacy, then an 'inconsistentValue' error must be
    returned. Note that if the value has been previously
    set (implicit or explicit) to any value, then the rules
    as defined in the StorageType Textual Convention apply.

    It is an implementation issue to decide if a SET for
    a readOnly or permanent row is accepted at all. In some
    contexts this may make sense, in others it may not. If
    a SET for a readOnly or permanent row is not accepted
    at all, then a 'wrongValue' error must be returned.

    Information by circitor

    usmUserStorageType OBJECT-TYPE SYNTAX StorageType MAX-ACCESS read-create STATUS current DESCRIPTION "The storage type for this conceptual row. Conceptual rows having the value 'permanent' must allow write-access at a minimum to: - usmUserAuthKeyChange, usmUserOwnAuthKeyChange and usmUserPublic for a user who employs authentication, and - usmUserPrivKeyChange, usmUserOwnPrivKeyChange and usmUserPublic for a user who employs privacy. Note that any user who employs authentication or privacy must allow its secret(s) to be updated and thus cannot be 'readOnly'. If an initial set operation tries to set the value to 'readOnly' for a user who employs authentication or privacy, then an 'inconsistentValue' error must be returned. Note that if the value has been previously set (implicit or explicit) to any value, then the rules as defined in the StorageType Textual Convention apply. It is an implementation issue to decide if a SET for a readOnly or permanent row is accepted at all. In some contexts this may make sense, in others it may not. If a SET for a readOnly or permanent row is not accepted at all, then a 'wrongValue' error must be returned. " DEFVAL { nonVolatile } ::= { usmUserEntry 12 }

    Information by cisco_v1

    usmUserStorageType OBJECT-TYPE SYNTAX StorageType ACCESS read-write STATUS mandatory DESCRIPTION "The storage type for this conceptual row. Conceptual rows having the value 'permanent' must allow write-access at a minimum to: - usmUserAuthKeyChange, usmUserOwnAuthKeyChange and usmUserPublic for a user who employs authentication, and - usmUserPrivKeyChange, usmUserOwnPrivKeyChange and usmUserPublic for a user who employs privacy. Note that any user who employs authentication or privacy must allow its secret(s) to be updated and thus cannot be 'readOnly'. If an initial set operation tries to set the value to 'readOnly' for a user who employs authentication or privacy, then an 'inconsistentValue' error must be returned. Note that if the value has been previously set (implicit or explicit) to any value, then the rules as defined in the StorageType Textual Convention apply. It is an implementation issue to decide if a SET for a readOnly or permanent row is accepted at all. In some contexts this may make sense, in others it may not. If a SET for a readOnly or permanent row is not accepted at all, then a 'wrongValue' error must be returned." DEFVAL { nonVolatile } ::= { usmUserEntry 12 }

    Information by oid_info

    Automatically extracted from RFC3414

    Information by mibdepot

    usmUserStorageType OBJECT-TYPE SYNTAX StorageType MAX-ACCESS read-create STATUS current DESCRIPTION "The storage type for this conceptual row. Conceptual rows having the value 'permanent' must allow write-access at a minimum to: - usmUserAuthKeyChange, usmUserOwnAuthKeyChange and usmUserPublic for a user who employs authentication, and - usmUserPrivKeyChange, usmUserOwnPrivKeyChange and usmUserPublic for a user who employs privacy. Note that any user who employs authentication or privacy must allow its secret(s) to be updated and thus cannot be 'readOnly'. If an initial set operation tries to set the value to 'readOnly' for a user who employs authentication or privacy, then an 'inconsistentValue' error must be returned. Note that if the value has been previously set (implicit or explicit) to any value, then the rules as defined in the StorageType Textual Convention apply. It is an implementation issue to decide if a SET for a readOnly or permanent row is accepted at all. In some contexts this may make sense, in others it may not. If a SET for a readOnly or permanent row is not accepted at all, then a 'wrongValue' error must be returned. " DEFVAL { nonVolatile } ::= { usmUserEntry 12 }

    Information by cisco

    usmUserStorageType OBJECT-TYPE SYNTAX StorageType MAX-ACCESS read-create STATUS current DESCRIPTION "The storage type for this conceptual row. Conceptual rows having the value 'permanent' must allow write-access at a minimum to: - usmUserAuthKeyChange, usmUserOwnAuthKeyChange and usmUserPublic for a user who employs authentication, and - usmUserPrivKeyChange, usmUserOwnPrivKeyChange and usmUserPublic for a user who employs privacy. Note that any user who employs authentication or privacy must allow its secret(s) to be updated and thus cannot be 'readOnly'. If an initial set operation tries to set the value to 'readOnly' for a user who employs authentication or privacy, then an 'inconsistentValue' error must be returned. Note that if the value has been previously set (implicit or explicit) to any value, then the rules as defined in the StorageType Textual Convention apply. It is an implementation issue to decide if a SET for a readOnly or permanent row is accepted at all. In some contexts this may make sense, in others it may not. If a SET for a readOnly or permanent row is not accepted at all, then a 'wrongValue' error must be returned. " DEFVAL { nonVolatile } ::= { usmUserEntry 12 }

    First Registration Authority (recovered by parent 1.3.6)

    Defense Communication Agency

    Current Registration Authority (recovered by parent 1.3.6)

    US DoD

    Brothers (12)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.6.3.15.1.2.2.1.1 usmUserEngineID 0 0 An SNMP engine's administratively-unique identifier.

    In a simple agent, this value is always that agent's
    own snmpEngineID value.…
    1.3.6.1.6.3.15.1.2.2.1.2 usmUserName 0 0 A human readable string representing the name of
    the user.

    This is the (User-based Security) Model dependent
    security ID.
    1.3.6.1.6.3.15.1.2.2.1.3 usmUserSecurityName 0 0 A human readable string representing the user in
    Security Model independent format.

    The default transformation of the User-based …
    1.3.6.1.6.3.15.1.2.2.1.4 usmUserCloneFrom 0 0 A pointer to another conceptual row in this
    usmUserTable. The user in this other conceptual
    row is called the clone-from user.

    Wh…
    1.3.6.1.6.3.15.1.2.2.1.5 usmUserAuthProtocol 0 0 An indication of whether messages sent on behalf of
    this user to/from the SNMP engine identified by
    usmUserEngineID, can be authe…
    1.3.6.1.6.3.15.1.2.2.1.6 usmUserAuthKeyChange 0 0 An object, which when modified, causes the secret
    authentication key used for messages sent on behalf
    of this user to/from the SN…
    1.3.6.1.6.3.15.1.2.2.1.7 usmUserOwnAuthKeyChange 0 0 Behaves exactly as usmUserAuthKeyChange, with one
    notable difference: in order for the set operation
    to succeed, the usmUserName …
    1.3.6.1.6.3.15.1.2.2.1.8 usmUserPrivProtocol 0 0 An indication of whether messages sent on behalf of
    this user to/from the SNMP engine identified by
    usmUserEngineID, can be prote…
    1.3.6.1.6.3.15.1.2.2.1.9 usmUserPrivKeyChange 0 0 An object, which when modified, causes the secret
    encryption key used for messages sent on behalf
    of this user to/from the SNMP e…
    1.3.6.1.6.3.15.1.2.2.1.10 usmUserOwnPrivKeyChange 0 0 Behaves exactly as usmUserPrivKeyChange, with one
    notable difference: in order for the Set operation
    to succeed, the usmUserName …
    1.3.6.1.6.3.15.1.2.2.1.11 usmUserPublic 0 0 A publicly-readable value which can be written as part
    of the procedure for changing a user's secret
    authentication and/or privac…
    1.3.6.1.6.3.15.1.2.2.1.13 usmUserStatus 0 0 The status of this conceptual row.

    Until instances of all corresponding columns are
    appropriately configured, the value of the
    cor…