Reference record for OID 1.3.6.1.6.3.16.1.4


parent
1.3.6.1.6.3.16.1 (vacmMIBObjects)
node code
4
node name
vacmAccessTable
dot oid
1.3.6.1.6.3.16.1.4
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpVacmMIB(16) vacmMIBObjects(1) vacmAccessTable(4)}
  • {iso(1) org(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpVacmMIB(16) vacmMIBObjects(1) vacmAccessTable(4)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpVacmMIB(16) vacmMIBObjects(1) vacmAccessTable(4)}
  • iri oid
  • /iso/identified-organization/dod/internet/snmpV2/snmpModules/snmpVacmMIB/vacmMIBObjects/vacmAccessTable
  • /iso/org/dod/internet/snmpV2/snmpModules/snmpVacmMIB/vacmMIBObjects/vacmAccessTable
  • /iso/iso-identified-organization/dod/internet/snmpV2/snmpModules/snmpVacmMIB/vacmMIBObjects/vacmAccessTable
  • iri by oid_info
    /ISO/Identified-Organization/6/1/6/3/16/1/4

    Description by circitor

    The table of access rights for groups.

    Each entry is indexed by a groupName, a contextPrefix,
    a securityModel and a securityLevel. To determine
    whether access is allowed, one entry from this table
    needs to be selected and the proper viewName from that
    entry must be used for access control checking.

    To select the proper entry, follow these steps:

    1) the set of possible matches is formed by the
    intersection of the following sets of entries:

    the set of entries with identical vacmGroupName
    the union of these two sets:
    - the set with identical vacmAccessContextPrefix
    - the set of entries with vacmAccessContextMatch
    value of 'prefix' and matching
    vacmAccessContextPrefix
    intersected with the union of these two sets:
    - the set of entries with identical
    vacmSecurityModel
    - the set of entries with vacmSecurityModel
    value of 'any'
    intersected with the set of entries with
    vacmAccessSecurityLevel value less than or equal
    to the requested securityLevel

    2) if this set has only one member, we're done
    otherwise, it comes down to deciding how to weight
    the preferences between ContextPrefixes,
    SecurityModels, and SecurityLevels as follows:
    a) if the subset of entries with securityModel
    matching the securityModel in the message is
    not empty, then discard the rest.
    b) if the subset of entries with
    vacmAccessContextPrefix matching the contextName
    in the message is not empty,
    then discard the rest
    c) discard all entries with ContextPrefixes shorter
    than the longest one remaining in the set
    d) select the entry with the highest securityLevel

    Please note that for securityLevel noAuthNoPriv, all
    groups are really equivalent since the assumption that
    the securityName has been authenticated does not hold.

    Parsed from file SNMP-VIEW-BASED-ACM-MIB.mib
    Module: SNMP-VIEW-BASED-ACM-MIB

    Description by cisco_v1

    The table of access rights for groups.

    Each entry is indexed by a groupName, a contextPrefix,
    a securityModel and a securityLevel. To determine
    whether access is allowed, one entry from this table
    needs to be selected and the proper viewName from that
    entry must be used for access control checking.

    To select the proper entry, follow these steps:

    1) the set of possible matches is formed by the
    intersection of the following sets of entries:
    the set of entries with identical vacmGroupName
    the union of these two sets:
    - the set with identical vacmAccessContextPrefix
    - the set of entries with vacmAccessContextMatch
    value of 'prefix' and matching
    vacmAccessContextPrefix
    intersected with the union of these two sets:
    - the set of entries with identical
    vacmSecurityModel
    - the set of entries with vacmSecurityModel
    value of 'any'
    intersected with the set of entries with
    vacmAccessSecurityLevel value less than or equal
    to the requested securityLevel

    2) if this set has only one member, we're done
    otherwise, it comes down to deciding how to weight
    the preferences between ContextPrefixes,
    SecurityModels, and SecurityLevels as follows:
    a) if the subset of entries with securityModel
    matching the securityModel in the message is
    not empty, then discard the rest.
    b) if the subset of entries with
    vacmAccessContextPrefix matching the contextName
    in the message is not empty,
    then discard the rest
    c) discard all entries with ContextPrefixes shorter
    than the longest one remaining in the set
    d) select the entry with the highest securityLevel

    Please note that for securityLevel noAuthNoPriv, all
    groups are really equivalent since the assumption that
    the securityName has been authenticated does not hold.

    Description by oid_info

    vacmAccessTable OBJECT-TYPE
    SYNTAX SEQUENCE OF VacmAccessEntry
    MAX-ACCESS not-accessible
    STATUS current
    DESCRIPTION "The table of access rights for groups.
    Each entry is indexed by a groupName, a contextPrefix,
    a securityModel and a securityLevel. To determine
    whether access is allowed, one entry from this table
    needs to be selected and the proper viewName from that
    entry must be used for access control checking.
    To select the proper entry, follow these steps:
    1) the set of possible matches is formed by the
    intersection of the following sets of entries:
    the set of entries with identical vacmGroupName
    the union of these two sets:
    - the set with identical vacmAccessContextPrefix
    - the set of entries with vacmAccessContextMatch
    value of prefix and matching
    vacmAccessContextPrefix
    intersected with the union of these two sets:
    - the set of entries with identical
    vacmSecurityModel
    - the set of entries with vacmSecurityModel
    value of any
    intersected with the set of entries with
    vacmAccessSecurityLevel value less than or equal
    to the requested securityLevel
    2) if this set has only one member, we
    e done
    otherwise, it comes down to deciding how to weight
    the preferences between ContextPrefixes,
    SecurityModels, and SecurityLevels as follows:
    a) if the subset of entries with securityModel
    matching the securityModel in the message is
    not empty, then discard the rest.
    b) if the subset of entries with
    vacmAccessContextPrefix matching the contextName
    in the message is not empty,
    then discard the rest
    c) discard all entries with ContextPrefixes shorter
    than the longest one remaining in the set
    d) select the entry with the highest securityLevel
    Please note that for securityLevel noAuthNoPriv, all
    groups are really equivalent since the assumption that
    the securityName has been authenticated does not hold.
    "

    View at oid-info.com

    Description by mibdepot

    The table of access rights for groups.

    Each entry is indexed by a groupName, a contextPrefix,
    a securityModel and a securityLevel. To determine
    whether access is allowed, one entry from this table
    needs to be selected and the proper viewName from that
    entry must be used for access control checking.

    To select the proper entry, follow these steps:

    1) the set of possible matches is formed by the
    intersection of the following sets of entries:

    the set of entries with identical vacmGroupName
    the union of these two sets:
    - the set with identical vacmAccessContextPrefix
    - the set of entries with vacmAccessContextMatch
    value of 'prefix' and matching
    vacmAccessContextPrefix
    intersected with the union of these two sets:
    - the set of entries with identical
    vacmSecurityModel
    - the set of entries with vacmSecurityModel
    value of 'any'
    intersected with the set of entries with
    vacmAccessSecurityLevel value less than or equal
    to the requested securityLevel
    2) if this set has only one member, we're done
    otherwise, it comes down to deciding how to weight
    the preferences between ContextPrefixes,
    SecurityModels, and SecurityLevels as follows:
    a) if the subset of entries with securityModel
    matching the securityModel in the message is
    not empty, then discard the rest.
    b) if the subset of entries with
    vacmAccessContextPrefix matching the contextName
    in the message is not empty,
    then discard the rest
    c) discard all entries with ContextPrefixes shorter
    than the longest one remaining in the set
    d) select the entry with the highest securityLevel

    Please note that for securityLevel noAuthNoPriv, all
    groups are really equivalent since the assumption that
    the securityName has been authenticated does not hold.

    Parsed from file rfc3415.mib.txt
    Company: None
    Module: SNMP-VIEW-BASED-ACM-MIB

    Description by cisco

    The table of access rights for groups.

    Each entry is indexed by a groupName, a contextPrefix,
    a securityModel and a securityLevel. To determine
    whether access is allowed, one entry from this table
    needs to be selected and the proper viewName from that
    entry must be used for access control checking.

    To select the proper entry, follow these steps:

    1) the set of possible matches is formed by the
    intersection of the following sets of entries:
    the set of entries with identical vacmGroupName
    the union of these two sets:
    - the set with identical vacmAccessContextPrefix
    - the set of entries with vacmAccessContextMatch
    value of 'prefix' and matching
    vacmAccessContextPrefix
    intersected with the union of these two sets:
    - the set of entries with identical
    vacmSecurityModel
    - the set of entries with vacmSecurityModel
    value of 'any'
    intersected with the set of entries with
    vacmAccessSecurityLevel value less than or equal
    to the requested securityLevel

    2) if this set has only one member, we're done
    otherwise, it comes down to deciding how to weight
    the preferences between ContextPrefixes,
    SecurityModels, and SecurityLevels as follows:
    a) if the subset of entries with securityModel
    matching the securityModel in the message is
    not empty, then discard the rest.
    b) if the subset of entries with
    vacmAccessContextPrefix matching the contextName
    in the message is not empty,
    then discard the rest
    c) discard all entries with ContextPrefixes shorter
    than the longest one remaining in the set
    d) select the entry with the highest securityLevel

    Please note that for securityLevel noAuthNoPriv, all
    groups are really equivalent since the assumption that
    the securityName has been authenticated does not hold.

    Information by circitor

    vacmAccessTable OBJECT-TYPE SYNTAX SEQUENCE OF VacmAccessEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The table of access rights for groups. Each entry is indexed by a groupName, a contextPrefix, a securityModel and a securityLevel. To determine whether access is allowed, one entry from this table needs to be selected and the proper viewName from that entry must be used for access control checking. To select the proper entry, follow these steps: 1) the set of possible matches is formed by the intersection of the following sets of entries: the set of entries with identical vacmGroupName the union of these two sets: - the set with identical vacmAccessContextPrefix - the set of entries with vacmAccessContextMatch value of 'prefix' and matching vacmAccessContextPrefix intersected with the union of these two sets: - the set of entries with identical vacmSecurityModel - the set of entries with vacmSecurityModel value of 'any' intersected with the set of entries with vacmAccessSecurityLevel value less than or equal to the requested securityLevel 2) if this set has only one member, we're done otherwise, it comes down to deciding how to weight the preferences between ContextPrefixes, SecurityModels, and SecurityLevels as follows: a) if the subset of entries with securityModel matching the securityModel in the message is not empty, then discard the rest. b) if the subset of entries with vacmAccessContextPrefix matching the contextName in the message is not empty, then discard the rest c) discard all entries with ContextPrefixes shorter than the longest one remaining in the set d) select the entry with the highest securityLevel Please note that for securityLevel noAuthNoPriv, all groups are really equivalent since the assumption that the securityName has been authenticated does not hold. " ::= { vacmMIBObjects 4 }

    Information by cisco_v1

    vacmAccessTable OBJECT-TYPE SYNTAX SEQUENCE OF VacmAccessEntry ACCESS not-accessible STATUS mandatory DESCRIPTION "The table of access rights for groups. Each entry is indexed by a groupName, a contextPrefix, a securityModel and a securityLevel. To determine whether access is allowed, one entry from this table needs to be selected and the proper viewName from that entry must be used for access control checking. To select the proper entry, follow these steps: 1) the set of possible matches is formed by the intersection of the following sets of entries: the set of entries with identical vacmGroupName the union of these two sets: - the set with identical vacmAccessContextPrefix - the set of entries with vacmAccessContextMatch value of 'prefix' and matching vacmAccessContextPrefix intersected with the union of these two sets: - the set of entries with identical vacmSecurityModel - the set of entries with vacmSecurityModel value of 'any' intersected with the set of entries with vacmAccessSecurityLevel value less than or equal to the requested securityLevel 2) if this set has only one member, we're done otherwise, it comes down to deciding how to weight the preferences between ContextPrefixes, SecurityModels, and SecurityLevels as follows: a) if the subset of entries with securityModel matching the securityModel in the message is not empty, then discard the rest. b) if the subset of entries with vacmAccessContextPrefix matching the contextName in the message is not empty, then discard the rest c) discard all entries with ContextPrefixes shorter than the longest one remaining in the set d) select the entry with the highest securityLevel Please note that for securityLevel noAuthNoPriv, all groups are really equivalent since the assumption that the securityName has been authenticated does not hold." ::= { vacmMIBObjects 4 }

    Information by oid_info

    Automatically extracted from RFC3415

    Information by mibdepot

    vacmAccessTable OBJECT-TYPE SYNTAX SEQUENCE OF VacmAccessEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The table of access rights for groups. Each entry is indexed by a groupName, a contextPrefix, a securityModel and a securityLevel. To determine whether access is allowed, one entry from this table needs to be selected and the proper viewName from that entry must be used for access control checking. To select the proper entry, follow these steps: 1) the set of possible matches is formed by the intersection of the following sets of entries: the set of entries with identical vacmGroupName the union of these two sets: - the set with identical vacmAccessContextPrefix - the set of entries with vacmAccessContextMatch value of 'prefix' and matching vacmAccessContextPrefix intersected with the union of these two sets: - the set of entries with identical vacmSecurityModel - the set of entries with vacmSecurityModel value of 'any' intersected with the set of entries with vacmAccessSecurityLevel value less than or equal to the requested securityLevel 2) if this set has only one member, we're done otherwise, it comes down to deciding how to weight the preferences between ContextPrefixes, SecurityModels, and SecurityLevels as follows: a) if the subset of entries with securityModel matching the securityModel in the message is not empty, then discard the rest. b) if the subset of entries with vacmAccessContextPrefix matching the contextName in the message is not empty, then discard the rest c) discard all entries with ContextPrefixes shorter than the longest one remaining in the set d) select the entry with the highest securityLevel Please note that for securityLevel noAuthNoPriv, all groups are really equivalent since the assumption that the securityName has been authenticated does not hold. " ::= { vacmMIBObjects 4 }

    Information by cisco

    vacmAccessTable OBJECT-TYPE SYNTAX SEQUENCE OF VacmAccessEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "The table of access rights for groups. Each entry is indexed by a groupName, a contextPrefix, a securityModel and a securityLevel. To determine whether access is allowed, one entry from this table needs to be selected and the proper viewName from that entry must be used for access control checking. To select the proper entry, follow these steps: 1) the set of possible matches is formed by the intersection of the following sets of entries: the set of entries with identical vacmGroupName the union of these two sets: - the set with identical vacmAccessContextPrefix - the set of entries with vacmAccessContextMatch value of 'prefix' and matching vacmAccessContextPrefix intersected with the union of these two sets: - the set of entries with identical vacmSecurityModel - the set of entries with vacmSecurityModel value of 'any' intersected with the set of entries with vacmAccessSecurityLevel value less than or equal to the requested securityLevel 2) if this set has only one member, we're done otherwise, it comes down to deciding how to weight the preferences between ContextPrefixes, SecurityModels, and SecurityLevels as follows: a) if the subset of entries with securityModel matching the securityModel in the message is not empty, then discard the rest. b) if the subset of entries with vacmAccessContextPrefix matching the contextName in the message is not empty, then discard the rest c) discard all entries with ContextPrefixes shorter than the longest one remaining in the set d) select the entry with the highest securityLevel Please note that for securityLevel noAuthNoPriv, all groups are really equivalent since the assumption that the securityName has been authenticated does not hold. " ::= { vacmMIBObjects 4 }

    First Registration Authority (recovered by parent 1.3.6)

    Defense Communication Agency

    Current Registration Authority (recovered by parent 1.3.6)

    US DoD

    Children (1)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.6.3.16.1.4.1 vacmAccessEntry 9 9 An access right configured in the Local Configuration
    Datastore (LCD) authorizing access to an SNMP context.

    Entries in this tabl…

    Brothers (3)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.6.3.16.1.1 vacmContextTable 1 2 The table of locally available contexts.

    This table provides information to SNMP Command
    Generator applications so that they can …
    1.3.6.1.6.3.16.1.2 vacmSecurityToGroupTable 1 6 This table maps a combination of securityModel and
    securityName into a groupName which is used to define
    an access control policy…
    1.3.6.1.6.3.16.1.5 vacmMIBViews 2 10 None