rfc2233.The Interfaces Group MIB using SMIv2
HCIP-223全真试题

223题库顺序Exam A[复制]1.企业网络常常使用DHCP为用户分配IP地址,与静态地址分配方式相比,DHCP地址分配方式极大地减少了对网络地址进行管理的工作量()*• A. 正确• B. 错误2.下列哪项故障排除方法不是使用TCP/IP参考模型作为理论基础的?()*• A. 对比配置法• B. 自项向下法• C. 自底向上法• D. 替换法3.确定项目组成员是实施阶段的工作内容()*• A. 正确• B. 错误4.下述哪些原因可能导致局域网内的MSTP协议无法正常工作()*【多选题】• A. MSTP配置错误• B. 物理链路发生震荡,触发设备发送大量TC报文• C. 使能MSTP的设备收到客户端或透传的MSTP TC报文• D. 未配置端口在指定生成树实例中的优先级5.在结构化的网络故障排除流程中的收集信息阶段,需要关注的内容有下列哪几项()*【多选题】• A. 需要收集哪些信息• B. 如何收集这些信息• C. 是否需要授权• D. 收集信息阶段的风险评估6.华为的企业网管产品是eSight,并分为三个版本:精简版、标准版、专业版,那么专业版跟标准版相比,主要增加了以下哪个特性?()*• A. 专业版提供数据库备份工具• B. 支持多用户管理• C. 支持WLAN,MPLS VPN的管理• D. 支持分层的管理模型7.以下哪些选项是在项目规划阶段需要完成的工作()*【多选题】• A. 确定技术方案• B. 了解项目背景• C. 选择网络产品• D. 确定项目需求• E. 规划IP地址8.在一个有着财务、OA(Office Automation System,办公自动化)、生产、甚至更多业务系统的复杂网络环境中,网络故障排除首先需要关注的是下列哪一项?()*• A. IP地址的分配• B. 网络设备的型号• C. 各业务系统的数据流方向• D. 机房的环境9.“打环”测试一般用在什么场合()*• A. 测试应用是否能正常连接• B. 测试路由协议是否能有效避免环路• C. 测试交换机是否能有效进行环路遏制和广播遏制• D. 测试物理线路是否有中断10.DHCP SNOOPING作为有效的安全机制,可以防止以下哪些攻击()*【多选题】• A. 防止DHCP仿冒攻击• B. 防止对DHCP服务器的DOS攻击• C. 防止MAC地址泛洪攻击• D. 结合DAI功能对数据包的源MAC地址进行检查• E. 结合IPSG功能对数据包的源IP地址进行检查11.以下哪一项是网络设计的关键()*• A. 关键技术的创新• B. 设备线路等元素的选择• C. 在合理的费用下提高性能• D. 保证网络稳定可靠12.企业为了提高互联出口的可靠性,常常采用多条链路连接不同运营商的方式,采用这种方式时,需要同时关注出方向和入方向的流量路径,否则可能会影响网络质量。
移动内部考试认证-IP承载网L2试题汇总

B
运行MSTP 的交换机需要记录MST Instance 和VLAN 的映 射关系,以下关于此记录方法的描述正确的是?
D
多生成树协议(MSTP)中,关于CIST 的描述正确的是?
A
多生成树协议(MSTP)中,以下端口角色属于CIST 端口角 色的是? 下面关于MST 配置标识(MST Configuration Identifier)说法错误的是? OSPF 协议使用Network-LSA 描述Transit 网段,为了正确 描述此网段,Network-LSA 需要标识此网段的IP 网络地 OSPF 协议使用Network-Summary-LSA 描述区域间路由信 息,以下关于Network-Summary-LSA 标识所描述网段的IP
序号 编号 2 990485 4 990485 6 990485 8 990485 10 990486 12 990486 14 990486 16 990486 18 990488 20 990488 22 990489 24 990487 26 990490 28 990490 30 990491 32 990491 34 990491 36 990491 38 990492 40 990492 42 990492 44 990492 46 990492 48 990492 50 990492 52 990492 54 990492 56 990492 58 990492 60 990492 62 990492 64 990492 66 990492 68 990492 70 990493
AB
L2TP协议中规定会话和隧道的建立顺序是什么?
B
以下哪种实现方式情况下,需要为转发的报文打上两层标 签?
BCD
MPLS BGP VPN中私网标签的分发是以下哪个协议完成的? B
FortiSwitch Data Center系列产品介绍说明书

DATA SHEETFortiSwitch ™ Data Center SeriesFortiSwitch Data Center switches deliver a Secure, Simple, Scalable Ethernet solution with outstanding throughput, resiliency, and scalability. Virtualization and cloud computing have created dense high-bandwidth Ethernet networking requirements. FortiSwitch Data Center switches meet these challenges by providing a high performance 10 GE, 40 GE, or 100 GE capable switching platform, with a low Total Cost of Ownership. Ideal for Top of Rack server or firewall aggregation applications, as well as SD-Branch network coredeployments, these switches are purpose-built to meetthe needs of today’s bandwidth intensive environments.Highlights§High throughput Ethernet switch suitable for Top of Rack or largeSD-Branch network deployments§ 1 GE, 10 GE, or 100 GE access ports, in a compact 1 RU form factor with 40 or 100 GE capable uplinks which includes breakout support for 2x50G, 4x25G, 4x10G, and 4x1G §FortiGate management through FortiLink, enabling the Security Fabric§Stackable up to 300 switches per FortiGate depending on model§Dual hot swappable power supplies for redundancy§Supports Wire-speed switching with both Store and Forward and Cut Through forwarding modesProduct OfferingsFortiSwitch 1024D, 1048E, 3032D, and 3032ESecurity Fabric Integration through FortiLinkThe FortiSwitch Data Center Series supports FortiGate managementthrough FortiLink, extending the Fortinet Security Fabric to the Ethernet port level. This link allows the same policies configured and applied to FortiGate interfaces to be applied to theFortiSwitch Ethernet ports, reducing complexity and decreasing management cost. With network security and access layer functions enabled and managed through a single console, centralized policy management, including role-based access and control, are easy to implement and manage. Users or devices can be authenticated against the same database and have the same security policy applied regardless of how or where they connect to the network.DATA SHEET | FortiSwitch™ Data Center SeriesDeploymentStandalone ModeThe FortiSwitch has a native GUI and CLI interface. All configuration and switch administration can be accomplished through either of theseinterfaces. Available ReSTful API’s offer additional configuration and management options.FortiLink ModeFortiLink is an innovative proprietary management protocol that allows our FortiGate Security Appliance to seamlessly manage any FortiSwitch. FortiLink enables the FortiSwitch to become a logical extension of the FortiGate integrating it directly into the Fortinet Security Fabric. This management option reduces complexity and decreases management cost as network security and access layer functions are enabled and managed through a single console.DATA SHEET | FortiSwitch ™ Data Center Series3HardwareFortiSwitch 3032D — frontFortiSwitch 3032D — backFortiSwitch 1048E — frontFortiSwitch 1048E — backFortiSwitch 1024D — backFortiSwitch 3032E — frontFortiSwitch 3032E — backFortiSwitch 1024D — frontDATA SHEET | FortiSwitch™ Data Center SeriesFeaturesLAG support for FortiLink Connection YesActive-Active Split LAG from FortiGate to FortiSwitches for Advanced Redundancy YesFORTISWITCH 1024D FORTISWITCH 1048E FORTISWITCH 3032D FORTISWITCH 3032E Layer 2Jumbo Frames Yes Yes Yes YesAuto-negotiation for port speed and duplex Yes Yes Yes YesIEEE 802.1D MAC Bridging/STP Yes Yes Yes YesIEEE 802.1w Rapid Spanning Tree Protocol (RSTP)Yes Yes Yes YesIEEE 802.1s Multiple Spanning Tree Protocol (MSTP)Yes Yes Yes YesSTP Root Guard Yes Yes Yes YesEdge Port / Port Fast Yes Yes Yes YesIEEE 802.1Q VLAN Tagging Yes Yes Yes YesPrivate VLAN Yes Yes Yes YesIEEE 802.3ad Link Aggregation with LACP Yes Yes Yes YesUnicast/Multicast traffic balance over trunking port(dst-ip, dst-mac, src-dst-ip, src-dst-mac, src-ip, src-mac)Yes Yes Yes YesIEEE 802.1AX Link Aggregation Yes Yes Yes YesSpanning Tree Instances (MSTP/CST)32/132/132/132/1IEEE 802.3x Flow Control and Back-pressure Yes Yes Yes YesIEEE 802.1Qbb Priority-based Flow Control Yes Yes Yes YesIEEE 802.3u 100Base-TX Yes No No YesIEEE 802.3z 1000Base-SX/LX Yes Yes Yes YesIEEE 802.3ab 1000Base-T Yes Yes No YesDATA SHEET | FortiSwitch™ Data Center Series Features* Requires ‘Advanced Features’ License5DATA SHEET | FortiSwitch™ Data Center Series RFC ComplianceRFC and MIB Support*BFDRFC 5880: Bidirectional Forwarding Detection (BFD)RFC 5881: Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop)RFC 5882: Generic Application of Bidirectional Forwarding Detection (BFD)BGPRFC 1771: A Border Gateway Protocol 4 (BGP-4)RFC 1965: Autonomous System Confederations for BGPRFC 1997: BGP Communities AttributeRFC 2545: Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain RoutingRFC 2796: BGP Route Reflection - An Alternative to Full Mesh IBGPRFC 2842: Capabilities Advertisement with BGP-4RFC 2858: Multiprotocol Extensions for BGP-4RFC 4271: BGP-4RFC 6286: Autonomous-System-Wide Unique BGP Identifier for BGP-4RFC 6608: Subcodes for BGP Finite State Machine ErrorRFC 6793: BGP Support for Four-Octet Autonomous System (AS) Number SpaceRFC 7606: Revised Error Handling for BGP UPDATE MessagesRFC 7607: Codification of AS 0 ProcessingRFC 7705: Autonomous System Migration Mechanisms and Their Effects on the BGP AS_PATH Attribute RFC 8212: Default External BGP (EBGP) Route Propagation Behavior without PoliciesRFC 8654: Extended Message Support for BGPDHCPRFC 2131: Dynamic Host Configuration ProtocolRFC 3046: DHCP Relay Agent Information OptionRFC 7513: Source Address Validation Improvement (SAVI) Solution for DHCPIP/IPv4RFC 3168: The Addition of Explicit Congestion Notification (ECN) to IPRFC 5227: IPv4 Address Conflict DetectionRFC 5517: Cisco Systems' Private VLANs: Scalable Security in a Multi-Client EnvironmentRFC 7039: Source Address Validation Improvement (SAVI) FrameworkIP MulticastRFC 2362: Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol SpecificationRFC 2710: Multicast Listener Discovery (MLD) for IPv6 (MLDv1)RFC 4541: Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping SwitchesRFC 4605: Internet Group Management Protocol (IGMP)/Multicast Listener Discovery (MLD)-Based Multicast Forwarding (“IGMP/MLD Proxying”)RFC 4607: Source-Specific Multicast for IPIPv6RFC 2464: Transmission of IPv6 Packets over Ethernet Networks: Transmission of IPv6 Packets over Ethernet NetworksRFC 2474: Definition of the Differentiated Services Field (DS Field) in the and IPv6 Headers (DSCP) RFC 2893: Transition Mechanisms for IPv6 Hosts and RoutersRFC 4213: Basic Transition Mechanisms for IPv6 Hosts and RouterRFC 4291: IP Version 6 Addressing ArchitectureRFC 4443: Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification RFC 4861: Neighbor Discovery for IP version 6 (IPv6)RFC 4862: IPv6 Stateless Address Auto configurationRFC 5095: Deprecation of Type 0 Routing Headers in IPv6RFC 6724: Default Address Selection for Internet Protocol version 6 (IPv6)RFC 7113: IPv6 RA GuardRFC 8200: Internet Protocol, Version 6 (IPv6) SpecificationRFC 8201: Path MTU Discovery for IP version 6IS-ISRFC 1195: Use of OSI IS-IS for Routing in TCP/IP and Dual EnvironmentsRFC 5308: Routing IPv6 with IS-ISMIBMIBRFC 1724: RIPv2-MIBRFC 1850: OSPF Version 2 Management Information BaseRFC 2233: The Interfaces Group MIB using SMIv2RFC 2618: Radius-Auth-Client-MIBRFC 2620: Radius-Acc-Client-MIBRFC 2674: Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering and Virtual LAN extensionsRFC 2787: Definitions of Managed Objects for the Virtual Router Redundancy ProtocolRFC 2819: Remote Network Monitoring Management Information BaseRFC 2932: IPv4 Multicast Routing MIBRFC 2934: Protocol Independent Multicast MIB for IPv4RFC 3289: Management Information Base for the Differentiated Services ArchitectureRFC 3433: Entity Sensor Management Information BaseRFC 3621: Power Ethernet MIBRFC 6933: Entity MIB (Version 4)OSPFRFC 1583: OSPF version 2RFC 1765: OSPF Database OverflowRFC 2328: OSPF version 2RFC 2370: The OSPF Opaque LSA OptionRFC 2740: OSPF for IPv6RFC 3101: The OSPF Not-So-Stubby Area (NSSA) OptionRFC 3137: OSPF Stub Router AdvertisementRFC 3623: OSPF Graceful RestartRFC 5340: OSPF for IPv6 (OSPFv3)RFC 5709: OSPFv2 HMAC-SHA Cryptographic AuthenticationRFC 6549: OSPFv2 Multi-Instance ExtensionsRFC 6845: OSPF Hybrid Broadcast and Point-to-Multipoint Interface TypeRFC 6860: Hiding Transit-Only Networks in OSPFRFC 7474: Security Extension for OSPFv2 When Using Manual Key ManagementRFC 7503: OSPF for IPv6RFC 8042: CCITT Draft Recommendation T.4RFC 8362: OSPFv3 Link State Advertisement (LSA) ExtensibilityOTHERRFC 2030: SNTPRFC 3176: InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed NetworksRFC 3768: VRRPRFC 3954: Cisco Systems NetFlow Services Export Version 9RFC 5101: Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow InformationRFC 5798: VRRPv3 (IPv4 and IPv6)RADIUSRFC 2865: Admin Authentication Using RADIUSRFC 2866: RADIUS AccountingRFC 5176: Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)RIPRFC 1058: Routing Information ProtocolRFC 2080: RIPng for IPv6RFC 2082: RIP-2 MD5 AuthenticationRFC 2453: RIPv2RFC 4822: RIPv2 Cryptographic AuthenticationSNMPRFC 1157: SNMPv1/v2cRFC 2571: Architecture for Describing SNMPDATA SHEET | FortiSwitch ™ Data Center Series7Specifications* Full line rate with minimum packet size of 427bytes on FS-1048E** Fortinet Warranty Policy:/doc/legal/EULA.pdfDATA SHEET | FortiSwitch ™ Data Center Series8Specifications* Full line rate with minimum packet size of 250bytes on FS-3032E, 194bytes on FS-3032D ** Fortinet Warranty Policy:/doc/legal/EULA.pdfDATA SHEET | FortiSwitch™ Data Center Series Order InformationFS-SW-LIC-3000SW License for FS-3000 Series Switches to activate Advanced Features.AC Power Supply FS-PSU-460Spare AC power supply for FS-1048E/1024DFS-PSU-800Spare AC power supply for FS-3032E* When managing a FortiSwitch with a FortiGate via FortiGate Cloud, no additional license is necessary.For details of Transceiver modules, see the Fortinet Transceivers datasheet. Copyright © 2020 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.FST-PROD-DS-SW4FS-DC-DAT-R23-202011。
中国移动CM-IMS试点测试规范_CSCF_BGCF设备分册v1.1.0_20090309

中国移动通信企业标准中国移动C M -I M S 试点测试规范 —— C S C F /B G C F 设备分册C h i n a M o b i l e C M -I M S T r i a lT e s t i n g S p e c i f i c a t i o n-C S C F /B G C F 版本号:1.1.0 中国移动通信集团公司 发布╳╳╳╳-╳╳-╳╳发布 ╳╳╳╳-╳╳-╳╳实施QB-╳╳-╳╳╳-╳╳╳╳目录1. 范围 (1)2. 规范性引用文件 (1)3. 术语、定义和缩略语 (1)4. 测试环境及说明 (2)4.1. 测试环境配置 (2)4.2. CM-IMS网络总体架构 ......................................................... 错误!未定义书签。
5. 设备功能测试 (3)5.1. P-CSCF (3)5.1.1. 用户注册/注销 (4)5.1.2. 注册异常处理 (11)5.1.3. 会话管理 (13)5.1.4. 会话与事务异常处理 (17)5.2. I-CSCF (21)5.2.1. 用户注册处理 (22)5.2.2. 注册异常处理 (23)5.2.3. 会话管理 (27)5.2.4. 网络拓扑隐藏处理......................................................... 错误!未定义书签。
5.3. S-CSCF (28)5.3.1. 用户注册/注销处理 (29)5.3.2. 异常处理 (42)5.3.3. 会话管理 (43)5.3.4. S-CSCF会话控制异常处理 (47)5.4. BGCF (50)5.5. 安全相关测试 (52)5.5.1. HTTP Digest (52)6. 编制历史 (56)前言本规范是依据中国移动IMS设备规范及3GPP相关协议规定而制定的,内容包括中国移动IMS网络中涉及的网元设备(P-CSCF、I-CSCF、S-CSCF/BGCF)的功能、接口规程、信令配合、维护、测量、性能、软硬件要求等方面,目的是在CM-IMS试点阶段,指导中国移动各分公司用于CSCF及BGCF设备入网测试,保证中国移动IMS网络中所涉及的网元设备的互通以及在网络中正常可靠地运行。
2009年Cisco系统有限公司产品说明书:Cisco Aironet 1300系列接口

0231A438 0231A494 3CXFP95 3CXFP96
3COM GLOBAL SERVICES
3Com Network Health Check, Installation Services and
Express Maintenance
/services_quote
Extensive report provides blueprint for action
Network Installation and Implementation Services Experts set-up and configure equipment and integrate technologies to maximize functionality and minimize business disruption
product names may be trademarks of their respective companies. While every effort is made to ensure the information given is accurate, 3Com does not accept liability
Additional Service, Support and Training Offerings
3Com GuardianSM Maintenance Service This service provides comprehensive on-site support and includes advance hardware replacement, expedited telephone technical support and software upgrades
MIB库——普天

6.3 SNMP接口内容要求6.3.1查询要求6.3.1.1基本信息6.3.1.1.1设备型号标准MIB,遵照ENTITY-MIB 中entPhysicalModelName 的定义,表示厂商定义的设备型号。
OID 号为:1.3.6.1.2.1.47.1.1.1.1.13.1。
1.3.6.1.2.1.47.1.1.1.1.13.1 (octet string) GW21006.3.1.1.2设备厂商标准MIB,遵照ENTITY-MIB 中entPhysicalMfgName 的定义,表示设备的制造商信息。
OID 号为:1.3.6.1.2.1.47.1.1.1.1.12.1。
1.3.6.1.2.1.47.1.1.1.1.12.1 (octet string) PT Tech.Co.Ltd.6.3.1.1.3设备序列号(SN)标准MIB,遵照ENTITY-MIB 中entPhysicalSerialNum 的定义,表示设备的制造商信息。
OID 号为:1.3.6.1.2.1.47.1.1.1.1.11.1。
1.3.6.1.2.1.47.1.1.1.1.11.1 (octet string) 09000008041234566.3.1.1.4设备厂商标识(OUI)私有MIB ,设备厂商标识(OUI)由设备厂商指定,并与TR069 中定义一致。
OID号为:1.3.6.1.4.1.35506.2.6.1.1.1.1.2.0 厂商OIU的mib值1.3.6.1.4.1.35506.2.6.1.1.1.1.2.0 (octet string) 0101006.3.1.1.5软件版本标准MIB,遵照ENTITY-MIB 中entPhysicalSoftwareRev 的定义,表示设备的制造商信息。
OID 号为:1.3.6.1.2.1.47.1.1.1.1.8.1。
1.3.6.1.2.1.47.1.1.1.1.8.1 (octet string) 1.06.3.1.1.6固件版本标准MIB,遵照ENTITY-MIB 中entPhysicalFirmwareRev 的定义,表示设备的制造商信息。
中国电信企业网关技术规范EVDO接入分册v2.0
中国电信集团公司技术标准Q/CT 2209-2009企业网关技术规范EVDO接入分册 Enterprise Gateway Technical SpecificationEVDO Section(V2.0)Q/CT 2209-2009目 录前言 (1)1.范围 (2)2.引用标准 (2)3.术语和缩略语 (4)4.总体描述 (6)4.1.企业网关体系参考模型 (6)4.2.企业网关在网络中的位置 (8)5.对网关的要求 (9)5.1.物理接口要求 (9)5.2.功能要求 (9)5.3.管理和维护要求 (11)5.4.性能要求 (13)5.5.其它要求 (13)6.对BBMS平台的要求 (13)6.1.配置管理方面 (13)6.2.集中监控方面 (15)6.3.远程操作维护 (16)6.4.统计分析 (16)6.5.业务开通 (17)6.6.卡验证 (17)7.对IT支撑系统的要求 (18)8.对无线数据卡的要求 (18)9.对管理接口的要求 (19)9.1.SNMP接口要求 (19)9.2.TR069接口要求 (23)附录C(规范性附录)业务配置描述 (25)C.1业务配置模板 (25)附录F (规范性附录) 企业网关和BBMS交互约定细则 (30)F.1EVDO WAN配置流程 (30)iQ/CT 2209-2009前 言EVDO接入是依托中国电信EVDO网络,在现有的商务领航企业网关上,通过外接USB无线数据卡,增加EVDO接入能力,以满足对无线宽带上网和链路可靠性要求较高的中小企业客户需求。
本规范结合企业网关支持EVDO无线数据卡的研究、实验成果,对现有企业网关技术规范进行补充和修订,主要描述内容包括:支持EVDO的企业网关体系参考模型;企业网关涉及EVDO无线接入的各项功能和性能指标;企业网关管理接口要求;企业网关对无线数据卡的要求等。
本规范目前版本为V2.0版本,是商务领航EVDO定制网关产品开发、测试的依据。
2021年IMS题库
IMS试题库一、填空题1.属于会话控制层网元有 CSCF 、 BGCF 、MGCF 、MRFC 、I-BCF2.IMS系统中,顾客私有标记为 IMPI ,顾客公有标记为 IMPU ;私有标记重要用于鉴权和认证;公有标记重要用于在业务呼喊时作为对外可寻址标记;3.DNS负责从 URL地址到 IP地址转换,ENUM负责从 E.164号码到 URL地址转换。
4.在IMS2.0中,使用ATCA平台IMS CORE产品整个软件安装重要涉及:各单板底层软件安装、 OMU软件安装和LMT安装、 GTAS SAM安装、 HSS数据库连接配备和运营准备、 ICG软件安装、 SMU和SAM客户端安装、各网元配备和加载。
5.SDP合同中,o行描述会话所有者关于参数,m行描述会话媒体信息6.PSI含义是公共服务标记7.SIP 合同响应消息中,1××代表暂时响应,2××代表成功,3××代表重定向,4××代表客户端错误,5××代表服务端错误,6××代表全局错误。
8.划分VLAN重要作用是隔离广播域,抑制广播报文、分隔不同顾客,提高网络安全性。
9.VRRP意思为虚拟路由器冗余合同,其在组网中重要作用是通过VRRP合同来实现路由器之间冗余和倒换,提高IP承载网可靠性,同步对端设备只看到一种虚拟路由器。
10.PE 是指服务提供商骨干网边沿路由器,CE是指直接与服务提供商相连顾客设备。
11.CSCF产品重要基本进程有: SCU 、CDB 、DPU 、BSU 。
二、判断题(对的打“√”,错误打“×”。
)1.3GPP R5版本定位于提供IP实时多媒体业务,核心网在PS基本上增长了IP多媒体域(IMS〕,IMS重要功能在控制层面,承载通过PS域。
(T)2.OMA组织重要是制定IMS系统架构方面关于规范。
(F)3.在运营商内设立各种HSS状况下,I-CSCF在登记注册及事务建立过程中通过SLF获得顾客签约数据所在HSS域名,SLF可与HSS合设。
rfc相关设置及使用
rfc相关设置及使用RFC(Request for Comments)是一种用于定义互联网协议、标准和相关问题的文档。
RFC的格式由互联网工程任务组(IETF)统一规定,它们记录了网络技术的发展和演进过程。
在本文中,我们将介绍RFC相关的设置和使用。
1. 了解RFC的作用和历史:RFC是由IETF组织制定的一种标准化文档,它记录了互联网协议的设计、开发和演化过程。
RFC起源于20世纪60年代的ARPANET,是一种社区驱动的文档,通过共享和讨论来推动互联网技术的发展。
RFC文档旨在提供指南、建议和最佳实践,帮助网络技术人员解决问题。
2. 寻找和阅读RFC文档:RFC文档可以在互联网上免费获取,IETF的官方网站和其他资源库都有存档。
这些文档按照顺序编号,并且以RFC开头,比如RFC 791定义了IPv4协议。
通过搜索引擎或在IETF网站上使用关键词搜索,可以找到特定主题的RFC文档。
阅读RFC文档时,应该注意文档的状态,有一些可能已经被更新或废弃。
3. 使用RFC文档:RFC文档在网络技术的发展过程中起着重要的指导作用。
它们提供了协议规范、算法实现、安全性和隐私等方面的建议。
网络管理员、网络工程师和开发人员可以使用RFC文档来了解和理解特定协议或标准的设计原理和要求。
此外,RFC文档还常用于进行互联网协议的实现、编程和配置。
4. 参与RFC的制定过程:RFC并不是静止的文件,而是一个持续演进的过程。
任何人都可以参与到RFC的制定过程中。
要参与RFC的制定,可以加入IETF并参与相关的工作组或邮件列表。
通过这种方式,个人可以提出改进建议,参与讨论和标准化的制定。
5. 遵循RFC的指导原则:在网络技术领域,遵循RFC的指导原则是至关重要的。
这些指导原则包括设计原则、协议分层、安全性和互操作性等要求。
遵循RFC的指导原则可以确保网络协议的正确性、稳定性和可靠性,同时也可以促进网络技术的发展和创新。
总结起来,RFC在互联网技术领域起着重要的作用,它们记录了互联网协议的发展历程和指导原则。
juniper交换机详细配置手册
命பைடு நூலகம்行配置指导手册
Version 1.0
目录 1 交换机基础知识 ........................................................................................................................................... 6
2 操作指导 .................................................................................................................................................... 30 2.1 通过CONSOLE线连接交换机 ............................................................................................................................... 30 2.2 SYSTEM系统参数配置 ......................................................................................................................................... 31 2.2.1 设置root密码 ............................................................................................................................................ 32 2.2.2 设置主机名 ............................................................................................................................................... 32 2.2.3 设置DNS服务器 ........................................................................................................................................ 32 2.2.4 设置日期时间 ........................................................................................................................................... 32 2.2.5 设置NTP服务器......................................................................................................................................... 33 2.2.6 开启远程Telnet登陆服务 ......................................................................................................................... 33 2.2.7 开启远程Ftp服务 ...................................................................................................................................... 33 2.2.8 开启远程ssh登陆 ...................................................................................................................................... 34 2.2.9 开启远程http登陆服务 ............................................................................................................................ 34 2.2.10 添加/删除用户........................................................................................................................................ 34 2.2.10.1 添加用户 ............................................................................................................................................................ 34 2.2.10.2 修改用户类别 .................................................................................................................................................... 35 2.2.10.3 修改用户密码 .................................................................................................................................................... 35 2.2.10.4 删除用户 ............................................................................................................................................................ 35 2.2.11 用户权限设置 ......................................................................................................................................... 35 2.3 VLAN配置 .......................................................................................................................................................... 36 2.3.1 VLAN配置步骤 .......................................................................................................................................... 37 2.3.2 VLAN配置规范要求 .................................................................................................................................. 37 2.3.3 添加VLAN .................................................................................................................................................. 37 2.3.4 修改端口VLAN .......................................................................................................................................... 39 2.3.5 删除VLAN .................................................................................................................................................. 39 2.3.6 配置VLAN网关IP ....................................................................................................................................... 40 第2页 共86页
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Network Working Group K. McCloghrie Request for Comments: 2233 Cisco Systems Obsoletes: 1573 F. Kastenholz Category: Standards Track FTP Software November 1997The Interfaces Group MIB using SMIv2Status of this MemoThis document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions forimprovements. Please refer to the current edition of the "InternetOfficial Protocol Standards" (STD 1) for the standardization stateand status of this protocol. Distribution of this memo is unlimited. Copyright NoticeCopyright (C) The Internet Society (1997). All Rights Reserved.Table of Contents1 Introduction (2)2 The SNMP Network Management Framework (2)2.1 Object Definitions (3)3 Experience with the Interfaces Group (3)3.1 Clarifications/Revisions (3)3.1.1 Interface Sub-Layers (4)3.1.2 Guidance on Defining Sub-layers (6)3.1.3 Virtual Circuits (8)3.1.4 Bit, Character, and Fixed-Length Interfaces (8)3.1.5 Interface Numbering (10)3.1.6 Counter Size (14)3.1.7 Interface Speed (16)3.1.8 Multicast/Broadcast Counters (17)3.1.9 Trap Enable (18)3.1.10 Addition of New ifType values (18)3.1.11 InterfaceIndex Textual Convention (18)3.1.12 New states for IfOperStatus (19)3.1.13 IfAdminStatus and IfOperStatus (20)3.1.14 IfOperStatus in an Interface Stack (21)3.1.15 Traps (21)3.1.16 ifSpecific (23)3.1.17 Creation/Deletion of Interfaces (24)3.1.18 All Values Must be Known (24)4 Media-Specific MIB Applicability (25)McCloghrie & Kastenholz Standards Track [Page 1]5 Overview (26)6 Interfaces Group Definitions (26)7 Acknowledgements (64)8 References (64)9 Security Considerations (65)10 Authors’ Addresses (65)11 Full Copyright Statement (66)1. IntroductionThis memo defines a portion of the Management Information Base(MIB) for use with network management protocols in the Internetcommunity. In particular, it describes managed objects used formanaging Network Interfaces.This memo discusses the ’interfaces’ group of MIB-II, especially the experience gained from the definition of numerous media- specific MIB modules for use in conjunction with the ’interfaces’ group formanaging various sub-layers beneath the internetwork- layer. Itspecifies clarifications to, and extensions of, the architecturalissues within the previous model used for the ’interfaces’ group.This memo also includes a MIB module. As well as including newMIB definitions to support the architectural extensions, this MIBmodule also re-specifies the ’interfaces’ group of MIB-II in amanner that is both compliant to the SNMPv2 SMI and semantically-identical to the existing SNMPv1-based definitions.The key words "MUST" and "MUST NOT" in this document are to beinterpreted as described in RFC 2119 [10].2. The SNMP Network Management FrameworkThe SNMP Network Management Framework presently consists of threemajor components. They are:o RFC 1902 which defines the SMI, the mechanisms used fordescribing and naming objects for the purpose of management.o STD 17, RFC 1213 defines MIB-II, the core set of managedobjects for the Internet suite of protocols.o STD 15, RFC 1157 and RFC 1905 which define two versions ofthe protocol used for network access to managed objects. McCloghrie & Kastenholz Standards Track [Page 2]The Framework permits new objects to be defined for the purpose ofexperimentation and evaluation.2.1. Object DefinitionsManaged objects are accessed via a virtual information store,termed the Management Information Base or MIB. Objects in the MIBare defined using the subset of Abstract Syntax Notation One(ASN.1) defined in the SMI. In particular, each object objecttype is named by an OBJECT IDENTIFIER, an administrativelyassigned name. The object type together with an object instanceserves to uniquely identify a specific instantiation of theobject. For human convenience, we often use a textual string,termed the descriptor, to refer to the object type.3. Experience with the Interfaces GroupOne of the strengths of internetwork-layer protocols such as IP[6] is that they are designed to run over any network interface.In achieving this, IP considers any and all protocols it runs overas a single "network interface" layer. A similar view is taken byother internetwork-layer protocols. This concept is representedin MIB-II by the ’interfaces’ group which defines a generic set ofmanaged objects such that any network interface can be managed inan interface-independent manner through these managed objects.The ’interfaces’ group provides the means for additional managedobjects specific to particular types of network interface (e.g., aspecific medium such as Ethernet) to be defined as extensions tothe ’interfaces’ group for media-specific management. Since thestandardization of MIB-II, many such media-specific MIB moduleshave been defined.Experience in defining these media-specific MIB modules has shownthat the model defined by MIB-II is too simplistic and/or staticfor some types of media-specific management. As a result, some ofthese media-specific MIB modules assume an evolution or looseningof the model. This memo documents and standardizes that evolutionof the model and fills in the gaps caused by that evolution. Thismemo also incorporates the interfaces group extensions documentedin RFC 1229 [7].3.1. Clarifications/RevisionsThere are several areas for which experience has indicated thatclarification, revision, or extension of the model would behelpful. The following sections discuss the changes in theinterfaces group adopted by this memo in each of these areas. McCloghrie & Kastenholz Standards Track [Page 3]In some sections, one or more paragraphs contain discussion ofrejected alternatives to the model adopted in this memo. Readersnot familiar with the MIB-II model and not interested in therationale behind the new model may want to skip these paragraphs.3.1.1. Interface Sub-LayersExperience in defining media-specific management information hasshown the need to distinguish between the multiple sub-layersbeneath the internetwork-layer. In addition, there is a need tomanage these sub-layers in devices (e.g., MAC-layer bridges) whichare unaware of which, if any, internetwork protocols run overthese sub-layers. As such, a model of having a single conceptualrow in the interfaces table (MIB-II’s ifTable) represent a wholeinterface underneath the internetwork-layer, and having a singleassociated media-specific MIB module (referenced via the ifTypeobject) is too simplistic. A further problem arises with thevalue of the ifType object which has enumerated values for eachtype of interface.Consider, for example, an interface with PPP running over an HDLClink which uses a RS232-like connector. Each of these sub-layershas its own media-specific MIB module. If all of this isrepresented by a single conceptual row in the ifTable, then anenumerated value for ifType is needed for that specificcombination which maps to the specific combination of media-specific MIBs. Furthermore, such a model still lacks a method todescribe the relationship of all the sub-layers of the MIB stack.An associated problem is that of upward and downward multiplexingof the sub-layers. An example of upward multiplexing is MLP(Multi-Link-Procedure) which provides load-sharing over severalserial lines by appearing as a single point-to-point link to thesub-layer(s) above. An example of downward multiplexing would beseveral instances of PPP, each framed within a separate X.25virtual circuit, all of which run over one fractional T1 channel,concurrently with other uses of the T1 link. The MIB structuremust allow these sorts of relationships to be described.Several solutions for representing multiple sub-layers wererejected. One was to retain the concept of one conceptual row forall the sub-layers of an interface and have each media-specificMIB module identify its "superior" and "subordinate" sub-layersthrough OBJECT IDENTIFIER "pointers". This scheme would haveseveral drawbacks: the superior/subordinate pointers would becontained in the media-specific MIB modules; thus, a manager couldnot learn the structure of an interface without inspectingmultiple pointers in different MIB modules; this would be overly McCloghrie & Kastenholz Standards Track [Page 4]complex and only possible if the manager had knowledge of all therelevant media-specific MIB modules; MIB modules would all need tobe retrofitted with these new "pointers"; this scheme would notadequately address the problem of upward and downwardmultiplexing; and finally, enumerated values of ifType would beneeded for each combination of sub-layers. Another rejectedsolution also retained the concept of one conceptual row for allthe sub-layers of an interface but had a new separate MIB table toidentify the "superior" and "subordinate" sub-layers and tocontain OBJECT IDENTIFIER "pointers" to the media-specific MIBmodule for each sub-layer. Effectively, one conceptual row in theifTable would represent each combination of sub-layers between theinternetwork-layer and the wire. While this scheme has fewerdrawbacks, it still would not support downward multiplexing, suchas PPP over MLP: observe that MLP makes two (or more) seriallines appear to the layers above as a single physical interface,and thus PPP over MLP should appear to the internetwork-layer as asingle interface; in contrast, this scheme would result in two (ormore) conceptual rows in the ifTable, both of which theinternetwork-layer would run over. This scheme would also requireenumerated values of ifType for each combination of sub-layers.The solution adopted by this memo is to have an individualconceptual row in the ifTable to represent each sub-layer, andhave a new separate MIB table (the ifStackTable, see section 6below) to identify the "superior" and "subordinate" sub-layersthrough INTEGER "pointers" to the appropriate conceptual rows inthe ifTable. This solution supports both upward and downwardmultiplexing, allows the IANAifType to Media-Specific MIB mappingto identify the media-specific MIB module for that sub-layer, suchthat the new table need only be referenced to obtain informationabout layering, and it only requires enumerated values of ifTypefor each sub-layer, not for combinations of them. However, itdoes require that the descriptions of some objects in the ifTable(specifically, ifType, ifPhysAddress, ifInUcastPkts, andifOutUcastPkts) be generalized so as to apply to any sub-layer(rather than only to a sub-layer immediately beneath the networklayer as previously), plus some (specifically, ifSpeed) which needto have appropriate values identified for use when a generalizeddefinition does not apply to a particular sub-layer.In addition, this adopted solution makes no requirement that adevice, in which a sub-layer is instrumented by a conceptual rowof the ifTable, be aware of whether an internetwork protocol runson top of (i.e., at some layer above) that sub-layer. In fact,the counters of packets received on an interface are defined ascounting the number "delivered to a higher-layer protocol". Thismeaning of "higher-layer" includes:McCloghrie & Kastenholz Standards Track [Page 5](1) Delivery to a forwarding module which acceptspackets/frames/octets and forwards them on at the sameprotocol layer. For example, for the purposes of thisdefinition, the forwarding module of a MAC-layer bridge isconsidered as a "higher-layer" to the MAC-layer of each porton the bridge.(2) Delivery to a higher sub-layer within a interface stack. Forexample, for the purposes of this definition, if a PPP moduleoperated directly over a serial interface, the PPP modulewould be considered the higher sub-layer to the serialinterface.(3) Delivery to a higher protocol layer which does not do packetforwarding for sub-layers that are "at the top of" theinterface stack. For example, for the purposes of thisdefinition, the local IP module would be considered thehigher layer to a SLIP serial interface.Similarly, for output, the counters of packets transmitted out aninterface are defined as counting the number "that higher-levelprotocols requested to be transmitted". This meaning of "higher-layer" includes:(1) A forwarding module, at the same protocol layer, whichtransmits packets/frames/octets that were received on andifferent interface. For example, for the purposes of thisdefinition, the forwarding module of a MAC-layer bridge isconsidered as a "higher-layer" to the MAC-layer of each porton the bridge.(2) The next higher sub-layer within an interface stack. Forexample, for the purposes of this definition, if a PPP moduleoperated directly over a serial interface, the PPP modulewould be a "higher layer" to the serial interface.(3) For sub-layers that are "at the top of" the interface stack,a higher element in the network protocol stack. For example,for the purposes of this definition, the local IP modulewould be considered the higher layer to an Ethernetinterface.3.1.2. Guidance on Defining Sub-layersThe designer of a media-specific MIB must decide whether to dividethe interface into sub-layers or not, and if so, how to make thedivisions. The following guidance is offered to assist themedia-specific MIB designer in these decisions.McCloghrie & Kastenholz Standards Track [Page 6]In general, the number of entries in the ifTable should be kept tothe minimum required for network management. In particular, agroup of related interfaces should be treated as a singleinterface with one entry in the ifTable providing that:(1) None of the group of interfaces performs multiplexing for anyother interface in the agent,(2) There is a meaningful and useful way for all of the ifTable’sinformation (e.g., the counters, and the status variables),and all of the ifTable’s capabilities (e.g., write access toifAdminStatus), to apply to the group of interfaces as awhole.Under these circumstances, there should be one entry in theifTable for such a group of interfaces, and any internal structurewhich needs to be represented to network management should becaptured in a MIB module specific to the particular type ofinterface.Note that application of bullet 2 above to the ifTable’s ifTypeobject requires that there is a meaningful media-specific MIB anda meaningful ifType value which apply to the group of interfacesas a whole. For example, it is not appropriate to treat an HDLCsub-layer and an RS-232 sub-layer as a single ifTable entry whenthe media-specific MIBs and the ifType values for HDLC and RS-232are separate (rather than combined).Subject to the above, it is appropriate to assign an ifIndex valueto any interface that can occur in an interface stack (in theifStackTable) where the bottom of the stack is a physicalinterface (ifConnectorPresent has the value ’true’) and there is alayer-3 or other application that "points down" to the top of thisstack. An example of an application that points down to the topof the stack is the Character MIB [9].Note that the sub-layers of an interface on one device willsometimes be different from the sub-layers of the interconnectedinterface of another device; for example, for a frame-relay DTEinterface connected a frameRelayService interface, the inter-connected DTE and DCE interfaces have different ifType values andmedia-specific MIBs.These guidelines are just that, guidelines. The designer of amedia-specific MIB is free to lay out the MIB in whatever SMIconformant manner is desired. However, in doing so, the media-specific MIB MUST completely specify the sub-layering model usedfor the MIB, and provide the assumptions, reasoning, and rationaleused to develop that model.McCloghrie & Kastenholz Standards Track [Page 7]3.1.3. Virtual CircuitsSeveral of the sub-layers for which media-specific MIB moduleshave been defined are connection oriented (e.g., Frame Relay,X.25). Experience has shown that each effort to define such a MIBmodule revisits the question of whether separate conceptual rowsin the ifTable are needed for each virtual circuit. Most, if notall, of these efforts to date have decided to have all virtualcircuits reference a single conceptual row in the ifTable.This memo strongly recommends that connection-oriented sub-layersdo not have a conceptual row in the ifTable for each virtualcircuit. This avoids the proliferation of conceptual rows,especially those which have considerable redundant information.(Note, as a comparison, that connection-less sub-layers do nothave conceptual rows for each remote address.) There may,however, be circumstances under which it is appropriate for avirtual circuit of a connection-oriented sub-layer to have its ownconceptual row in the ifTable; an example of this might be PPPover an X.25 virtual circuit. The MIB in section 6 of this memosupports such circumstances.If a media-specific MIB wishes to assign an entry in the ifTableto each virtual circuit, the MIB designer must present therationale for this decision in the media-specific MIB’sspecification.3.1.4. Bit, Character, and Fixed-Length InterfacesRS-232 is an example of a character-oriented sub-layer over which(e.g., through use of PPP) IP datagrams can be sent. Due to thepacket-based nature of many of the objects in the ifTable,experience has shown that it is not appropriate to have acharacter-oriented sub-layer represented by a whole conceptual rowin the ifTable.Experience has also shown that it is sometimes desirable to havesome management information for bit-oriented interfaces, which aresimilarly difficult to represent by a whole conceptual row in theifTable. For example, to manage the channels of a DS1 circuit,where only some of the channels are carrying packet-based data.A further complication is that some subnetwork technologiestransmit data in fixed length transmission units. One example ofsuch a technology is cell relay, and in particular AsynchronousTransfer Mode (ATM), which transmits data in fixed-length cells.Representing such a interface as a packet-based interface produces McCloghrie & Kastenholz Standards Track [Page 8]redundant objects if the relationship between the number ofpackets and the number of octets in either direction is fixed bythe size of the transmission unit (e.g., the size of a cell).About half the objects in the ifTable are applicable to every typeof interface: packet-oriented, character-oriented, and bit-oriented. Of the other half, two are applicable to bothcharacter-oriented and packet-oriented interfaces, and the restare applicable only to packet-oriented interfaces. Thus, while itis desirable for consistency to be able to represent any/all typesof interfaces in the ifTable, it is not possible to implement thefull ifTable for bit- and character-oriented sub-layers.A rejected solution to this problem would be to split the ifTableinto two (or more) new MIB tables, one of which would containobjects that are relevant only to packet-oriented interfaces(e.g., PPP), and another that may be used by all interfaces. Thisis highly undesirable since it would require changes in everyagent implementing the ifTable (i.e., just about every existingSNMP agent).The solution adopted in this memo builds upon the fact thatcompliance statements in SNMPv2 (in contrast to SNMPv1) refer toobject groups, where object groups are explicitly defined bylisting the objects they contain. Thus, in SNMPv2, multiplecompliance statements can be specified, one for all interfaces andadditional ones for specific types of interfaces. The separatecompliance statements can be based on separate object groups,where the object group for all interfaces can contain only thoseobjects from the ifTable which are appropriate for every type ofinterfaces. Using this solution, every sub-layer can have its ownconceptual row in the ifTable.Thus, section 6 of this memo contains definitions of the objectsof the existing ’interfaces’ group of MIB-II, in a manner which isboth SNMPv2-compliant and semantically-equivalent to the existingMIB-II definitions. With equivalent semantics, and with the BER("on the wire") encodings unchanged, these definitions retain thesame OBJECT IDENTIFIER values as assigned by MIB-II. Thus, ingeneral, no rewrite of existing agents which conform to MIB-II andthe ifExtensions MIB is required.In addition, this memo defines several object groups for thepurposes of defining which objects apply to which types ofinterface:McCloghrie & Kastenholz Standards Track [Page 9](1) the ifGeneralInformationGroup. This group contains thoseobjects applicable to all types of network interfaces,including bit-oriented interfaces.(2) the ifPacketGroup. This group contains those objectsapplicable to packet-oriented network interfaces.(3) the ifFixedLengthGroup. This group contains the objectsapplicable not only to character-oriented interfaces, such asRS-232, but also to those subnetwork technologies, such ascell-relay/ATM, which transmit data in fixed lengthtransmission units. As well as the octet counters, there arealso a few other counters (e.g., the error counters) whichare useful for this type of interface, but are currentlydefined as being packet-oriented. To accommodate this, thedefinitions of these counters are generalized to apply tocharacter-oriented interfaces and fixed-length-transmissioninterfaces.It should be noted that the octet counters in the ifTableaggregate octet counts for unicast and non-unicast packets into asingle octet counter per direction (received/transmitted). Thus,with the above definition of fixed-length-transmission interfaces,where such interfaces which support non-unicast packets, separatecounts of unicast and multicast/broadcast transmissions can onlybe maintained in a media-specific MIB module.3.1.5. Interface NumberingMIB-II defines an object, ifNumber, whose value represents:"The number of network interfaces (regardless of theircurrent state) present on this system."Each interface is identified by a unique value of the ifIndexobject, and the description of ifIndex constrains its value asfollows:"Its value ranges between 1 and the value of ifNumber. Thevalue for each interface must remain constant at least fromone re-initialization of the entity’s network managementsystem to the next re-initialization."This constancy requirement on the value of ifIndex for aparticular interface is vital for efficient management. However,an increasing number of devices allow for the dynamicaddition/removal of network interfaces. One example of this is adynamic ability to configure the use of SLIP/PPP over aMcCloghrie & Kastenholz Standards Track [Page 10]character-oriented port. For such dynamic additions/removals, thecombination of the constancy requirement and the restriction thatthe value of ifIndex is less than ifNumber is problematic.Redefining ifNumber to be the largest value of ifIndex wasrejected since it would not help. Such a re-definition wouldrequire ifNumber to be deprecated and the utility of the redefinedobject would be questionable. Alternatively, ifNumber could bedeprecated and not replaced. However, the deprecation of ifNumberwould require a change to that portion of ifIndex’s definitionwhich refers to ifNumber. So, since the definition of ifIndexmust be changed anyway in order to solve the problem, changes toifNumber do not benefit the solution.The solution adopted in this memo is just to delete therequirement that the value of ifIndex must be less than the valueof ifNumber, and to retain ifNumber with its current definition.This is a minor change in the semantics of ifIndex; however, allexisting agent implementations conform to this new definition, andin the interests of not requiring changes to existing agentimplementations and to the many existing media-specific MIBs, thismemo assumes that this change does not require ifIndex to bedeprecated. Experience indicates that this assumption does"break" a few management applications, but this is consideredpreferable to breaking all agent implementations.This solution also results in the possibility of "holes" in theifTable, i.e., the ifIndex values of conceptual rows in theifTable are not necessarily contiguous, but SNMP’s GetNext (andSNMPv2’s GetBulk) operation easily deals with such holes. Thevalue of ifNumber still represents the number of conceptual rows,which increases/decreases as new interfaces are dynamicallyadded/removed.The requirement for constancy (between re-initializations) of aninterface’s ifIndex value is met by requiring that after aninterface is dynamically removed, its ifIndex value is not re-usedby a *different* dynamically added interface until after thefollowing re-initialization of the network management system.This avoids the need for assignment (in advance) of ifIndex valuesfor all possible interfaces that might be added dynamically. Theexact meaning of a "different" interface is hard to define, andthere will be gray areas. Any firm definition in this documentwould likely to turn out to be inadequate. Instead, implementorsmust choose what it means in their particular situation, subjectto the following rules:McCloghrie & Kastenholz Standards Track [Page 11](1) a previously-unused value of ifIndex must be assigned to adynamically added interface if an agent has no knowledge ofwhether the interface is the "same" or "different" to apreviously incarnated interface.(2) a management station, not noticing that an interface has goneaway and another has come into existence, must not beconfused when calculating the difference between the countervalues retrieved on successive polls for a particular ifIndexvalue.When the new interface is the same as an old interface, but adiscontinuity in the value of the interface’s counters cannot beavoided, the ifTable has (until now) required that a new ifIndexvalue be assigned to the returning interface. That is, either allcounter values have had to be retained during the absence of aninterface in order to use the same ifIndex value on thatinterface’s return, or else a new ifIndex value has had to beassigned to the returning interface. Both alternatives haveproved to be burdensome to some implementations:(1) maintaining the counter values may not be possible (e.g., ifthey are maintained on removable hardware),(2) using a new ifIndex value presents extra work for managementapplications. While the potential need for such extra workis unavoidable on agent re-initializations, it is desirableto avoid it between re-initializations.To address this, a new object, ifCounterDiscontinuityTime, hasbeen defined to record the time of the last discontinuity in aninterface’s counters. By monitoring the value of this new object,a management application can now detect counter discontinuitieswithout the ifIndex value of the interface being changed. Thus,an agent which implements this new object should, when a newinterface is the same as an old interface, retain that interface’sifIndex value and update if necessary the interface’s value ofifCounterDiscontinuityTime. With this new object, a managementapplication must, when calculating differences between countervalues retrieved on successive polls, discard any calculateddifference for which the value of ifCounterDiscontinuityTime isdifferent for the two polls. (Note that this test must beperformed in addition to the normal checking of sysUpTime todetect an agent re-initialization.) Since such discards are awaste of network management processing and bandwidth, an agentshould not update the value of ifCounterDiscontinuityTime unlessabsolutely necessary.McCloghrie & Kastenholz Standards Track [Page 12]。