smilint output for ./CABH-SEC-MIB


Message Severities
SeverityCount
severe1
error4
warning5
Message Types
TypeCount
basetype-unknown (error)1
import-failed (error)1
import-unused (warning)1
inetaddress-inetaddresstype (warning)2
integer-misuse (warning)2
object-identifier-not-prefix (error)1
object-identifier-unknown (severe)1
type-unknown (error)1

Messages:

CABH-SEC-MIB

   1: -- extracted from draft-jones-cable-gateway-security-mib-02.txt
   2: -- at Sun Mar  9 06:12:36 2003
   3: 
   4:    CABH-SEC-MIB DEFINITIONS ::= BEGIN 
   5:    IMPORTS 
   6:        MODULE-IDENTITY, 
   7:        Unsigned32, 
   8:        zeroDotZero, 
   9:        OBJECT-TYPE                FROM SNMPv2-SMI  -- RFC2578 
  10:     
  11:        RowStatus, 
  12:        DateAndTime, 
  13:        TruthValue, 
  14:        DisplayString, 
  15:        TimeStamp, 
  16:        TEXTUAL-CONVENTION, 
  16: warning - warning: identifier `TEXTUAL-CONVENTION' imported from module `SNMPv2-TC' is never used
  17:        VariablePointer            FROM SNMPv2-TC  -- RFC2579 
  18:         
  19:        OBJECT-GROUP, 
  20:        MODULE-COMPLIANCE          FROM SNMPv2-CONF -- RFC2580 
  21:        InetPortNumber, 
  22:        InetAddress                FROM INET-ADDRESS-MIB --RFC3291 
  23:          
  24:        SnmpAdminString            FROM SNMP-FRAMEWORK-MIB --RFC2571 
  25:     
  26:        DocsX509ASN1DEREncodedCertificate FROM DOCS-BPI2-MIB 
  26: error - identifier `DocsX509ASN1DEREncodedCertificate' cannot be imported from module `DOCS-BPI2-MIB'
  27:     
  28:        ZeroBasedCounter32 FROM RMON2-MIB; 
  29:         
  30:        cabhSecMib MODULE-IDENTITY 
  31:        LAST-UPDATED    "200303010000Z" -- March 1, 2003 
  32:        ORGANIZATION    "CableLabs Broadband Access Department" 
  33:        CONTACT-INFO 
  34:                "Kevin Luehrs 
  35:                 Postal: Cable Television Laboratories, Inc. 
  36:                 400 Centennial Parkway 
  37:                 Louisville, Colorado 80027-1266 
  38:                 U.S.A. 
  39:                 Phone:  +1 303-661-9100 
  40:                 Fax:    +1 303-661-9199 
  41:                 E-mail: k.luehrs@cablelabs.com; mibs@cablelabs.com" 
  42:        DESCRIPTION 
  43:                "This MIB module supplies the basic management 
  44:                 objects for the Security Portal Services." 
  45:        REVISION "200303010000Z" -- March 1, 2003 
  46:        DESCRIPTION 
  47:                "Initial version, published as RFC xxxx." 
  48:                 -- RFC editor to assign xxxx 
  49:        ::= { mib-2 xx }   -- xx to be assigned by IANA 
  49: error - Object identifier element `xx' name only allowed as first element
  49: severe - unknown object identifier label `mib-2'
  50:     
  51:    -- Textual Conventions 
  52:     
  53:       cabhSecMibObjects  OBJECT IDENTIFIER ::= { cabhSecMib 1 } 
  54:       cabhSecFwObjects   OBJECT IDENTIFIER ::= { cabhSecMibObjects 1 } 
  55:       cabhSecFwBase      OBJECT IDENTIFIER ::= { cabhSecFwObjects 1 } 
  56:       cabhSecFwLogCtl    OBJECT IDENTIFIER ::= { cabhSecFwObjects 2 } 
  57:     
  58:       cabhSecCertObjects OBJECT IDENTIFIER ::= { cabhSecMibObjects 2 } 
  59:       cabhSecKerbObjects OBJECT IDENTIFIER ::= { cabhSecMibObjects 3 } 
  60:       cabhSecKerbBase    OBJECT IDENTIFIER ::= { cabhSecKerbObjects 1 } 
  61:       cabhSec2FwObjects  OBJECT IDENTIFIER ::= { cabhSecMibObjects 4 } 
  62:       cabhSec2FwBase     OBJECT IDENTIFIER ::= { cabhSec2FwObjects 1 } 
  63:       cabhSec2FwEvent    OBJECT IDENTIFIER ::= { cabhSec2FwObjects 2 } 
  64:       cabhSec2FwLog      OBJECT IDENTIFIER ::= { cabhSec2FwObjects 3 } 
  65:       cabhSec2FwFilter   OBJECT IDENTIFIER ::= { cabhSec2FwObjects 4 } 
  66:     
  67:    --cabhSec2Misc        OBJECT IDENTIFIER ::= { cabhSecMib 5 } 
  68:    --might be needed for config file encryption key management 
  69:     
  70:    -- 
  71:    --    CableHome 1.0 Base Firewall Functions 
  72:    -- 
  73:     
  74:    cabhSecFwPolicyFileEnable OBJECT-TYPE 
  75:        SYNTAX      INTEGER { 
  76:                        enable(1), 
  77:                        disable(2) 
  78:                    } 
  79:        MAX-ACCESS  read-write 
  80:        STATUS      current 
  81:        DESCRIPTION 
  82:             "This parameter indicates whether or not to enable 
  83:              the firewall functionality." 
  84:        DEFVAL {enable} 
  85:        ::= { cabhSecFwBase 1 } 
  86:     
  87:    cabhSecFwPolicyFileURL OBJECT-TYPE 
  88:        SYNTAX      DisplayString 
  89:        MAX-ACCESS  read-write 
  90:        STATUS      current 
  91:        DESCRIPTION 
  92:                "This object contains the name and IP address of 
  93:                 the policy rule set file in a TFTP URL format. 
  94:                 Once this object has been updated, it will trigger 
  95:                 the file download."     
  96:        ::= { cabhSecFwBase 2 } 
  97:     
  98:     
  99:    cabhSecFwPolicyFileHash OBJECT-TYPE 
 100:        SYNTAX OCTET STRING (SIZE(0|20)) 
 101:        MAX-ACCESS read-write 
 102:        STATUS current 
 103:        DESCRIPTION 
 104:                "Hash of the contents of the rules set file, 
 105:                 calculated and sent to the PS prior to sending 
 106:                 the rules set file.  For the SHA-1 authentication  
 107:                 algorithm the length of the hash is 160 bits. 
 108:                 This hash value is encoded in binary format." 
 109:        DEFVAL {''h} 
 110:        ::= { cabhSecFwBase 3 } 
 111: 
 112:    cabhSecFwPolicyFileOperStatus OBJECT-TYPE 
 113:        SYNTAX     INTEGER    { 
 114:                        inProgress(1), 
 115:                        complete(2), 
 116:                      -- completeFromMgt(3), deprecated 
 117:                        failed(4) 
 118:                   } 
 119:        MAX-ACCESS read-only 
 120:        STATUS current 
 121:        DESCRIPTION 
 122:                "inProgress(1) indicates a firewall configuration 
 123:                  file download is underway. 
 124:                  complete (2) indicates the firewall configuration 
 125:                  file downloaded and configured successfully. 
 126:                  completeFromMgt(3) This state is deprecated. 
 127:                  failed(4) indicates the last attempted firewall 
 128:                  configuration file download or processing  
 129:                  failed ordinarily due to TFTP timeout." 
 130:        ::= { cabhSecFwBase 4 } 
 131:     
 132:     
 133:    cabhSecFwPolicyFileCurrentVersion OBJECT-TYPE 
 134:        SYNTAX      SnmpAdminString 
 135:        MAX-ACCESS  read-only 
 136:        STATUS      current 
 137:        DESCRIPTION 
 138:                "The rule set version currently operating in the 
 139:                 PS device. This object should be in the syntax 
 140:                 used by the individual vendor to identify software 
 141:                 versions.  Any PS element MUST return a string 
 142:                 descriptive of the current rule set file load. 
 143:                 If this is not applicable, this object MUST 
 144:                 contain an empty string." 
 145:        ::= { cabhSecFwBase 5 } 
 146:     
 147:    -- 
 148:    --    CableHome 1.0 Firewall Event MIBs 
 149:    -- 
 150:     
 151:     
 152:    cabhSecFwEventType1Enable OBJECT-TYPE 
 153:        SYNTAX    INTEGER { 
 154:                      enable (1), -- log event 
 155:                      disable (2) -- do not log event  
 156:                  } 
 157:        MAX-ACCESS read-write 
 158:        STATUS    current 
 159:        DESCRIPTION 
 160:            "This object enables or disables logging of type 1 
 161:             firewall event messages. Type 1 event messages report 
 162:             attempts from both private and public clients to 
 163:             traverse the firewall that violate the Security 
 164:             Policy." 
 165:        DEFVAL { disable } 
 166:        ::= { cabhSecFwLogCtl 1 } 
 167:     
 168:    cabhSecFwEventType2Enable OBJECT-TYPE 
 169:        SYNTAX    INTEGER { 
 170:                     enable (1), -- log event 
 171:                     disable (2) -- do not log event 
 172:                  } 
 173:        MAX-ACCESS read-write 
 174:        STATUS current 
 175:        DESCRIPTION 
 176:                "This object enables or disables logging of 
 177:                 type 2 firewall event messages. Type 2 event 
 178:                 messages report identified Denial of Service 
 179:                 attack attempts." 
 180:        DEFVAL { disable } 
 181:        ::= { cabhSecFwLogCtl 2 } 
 182:     
 183:    cabhSecFwEventType3Enable OBJECT-TYPE 
 184:        SYNTAX INTEGER { 
 185:                  enable (1), -- log event 
 186:                  disable (2) -- do not log event 
 187:               } 
 188:        MAX-ACCESS read-write 
 189:        STATUS current 
 190:        DESCRIPTION 
 191:                "Enables or disables logging of type 3 firewall 
 192:                 event messages. Type 3 event messages report 
 193:                 changes made to the following firewall management 
 194:                 parameters: cabhSecFwPolicyFileURL, 
 195:                 cabhSecFwPolicyFileCurrentVersion, 
 196:                 cabhSecFwPolicyFileEnable" 
 197:        DEFVAL { disable } 
 198:        ::= { cabhSecFwLogCtl 3 } 
 199:     
 200:    cabhSecFwEventAttackAlertThreshold  OBJECT-TYPE 
 201:        SYNTAX     INTEGER    (0..65535) 
 201: warning - warning: use Integer32 instead of INTEGER in SMIv2
 202:        MAX-ACCESS read-write 
 203:        STATUS current 
 204:        DESCRIPTION 
 205:                "If the number of type 1 or 2 hacker attacks 
 206:                 exceeds this threshold in the period define 
 207:                 by cabhSecFwEventAttackAlertPeriod, a firewall 
 208:                 message event MUST be logged with priority 
 209:                 level 4." 
 210: 
 211:        DEFVAL { 65535 } 
 212:        ::= { cabhSecFwLogCtl 4 } 
 213:     
 214:     
 215:    cabhSecFwEventAttackAlertPeriod OBJECT-TYPE 
 216:        SYNTAX    INTEGER (0..65535) 
 216: warning - warning: use Integer32 instead of INTEGER in SMIv2
 217:        MAX-ACCESS read-write 
 218:        STATUS current 
 219:        DESCRIPTION  
 220:                "Indicates the period to be used (in hours) for 
 221:                 the cabhSecFwEventAttackAlertThreshold. This MIB 
 222:                 variable should always keep track of the last x 
 223:                 hours of events meaning that if the variable is 
 224:                 set to track events for 10 hours then when the 
 225:                 11th hour is reached, the 1st hour of events is 
 226:                 deleted from the tracking log. A default value 
 227:                 is set to zero, meaning zero time, so that this 
 228:                 MIB variable will not track any events unless 
 229:                 configured." 
 230:        DEFVAL {0} 
 231:        ::= { cabhSecFwLogCtl 5 } 
 232:     
 233:     
 234:    -- 
 235:    -- CableHome PS device certificate 
 236:    --  
 237:     
 238:        cabhSecCertPsCert OBJECT-TYPE 
 238: error - type `DocsX509ASN1DEREncodedCertificate' of node `cabhSecCertPsCert' does not resolve to a known base type
 239:        SYNTAX         DocsX509ASN1DEREncodedCertificate 
 240:        MAX-ACCESS    read-only 
 240: error - unknown type `DocsX509ASN1DEREncodedCertificate'
 241:        STATUS         current 
 242:        DESCRIPTION 
 243:           "The X509 DER-encoded PS certificate." 
 244:        ::= { cabhSecCertObjects 1 } 
 245:     
 246:     
 247:     
 248:    -- 
 249:    --  CableHome 1.1 Firewall Management MIBs  
 250:    -- 
 251:     
 252:    cabhSec2FwEnable OBJECT-TYPE 
 253:        SYNTAX      INTEGER    { 
 254:                       enabled(1), 
 255:                       disabled(2) 
 256:                     } 
 257:        MAX-ACCESS  read-write 
 258:        STATUS      current 
 259:        DESCRIPTION 
 260:                "This parameter indicates whether to enable or disable 
 261:    the 
 262:                 firewall." 
 263:     
 264:        DEFVAL {enabled } 
 265:        ::= { cabhSec2FwBase 1 } 
 266:     
 267:     
 268:     
 269:    cabhSec2FwPolicyFileURL OBJECT-TYPE 
 270:        SYNTAX      SnmpAdminString  
 271:        MAX-ACCESS  read-write 
 272:        STATUS      current 
 273:        DESCRIPTION 
 274:                "This object contains the name and IP address 
 275:                 of the policy ruleset file in a TFTP or HTTP URL 
 276:                 format. Once this object has been updated, it 
 277:                 will trigger the file download." 
 278:        ::= { cabhSec2FwBase 2 } 
 279:     
 280:     
 281:    cabhSec2FwPolicyFileHash OBJECT-TYPE 
 282:        SYNTAX OCTET STRING (SIZE(0|20)) 
 283:        MAX-ACCESS read-write 
 284:        STATUS current 
 285:        DESCRIPTION 
 286:                "Hash of the contents of the firewall 
 287:                 configuration file. For the SHA-1 authentication 
 288:                 algorithm the length of the hash is 160 bits. 
 289:                 This hash value is encoded in binary format." 
 290:        DEFVAL { ''h} 
 291:        ::= { cabhSec2FwBase 3 } 
 292:     
 293:    cabhSec2FwPolicyFileOperStatus OBJECT-TYPE 
 294:        SYNTAX      INTEGER { 
 295:                        inProgress(1), 
 296:                        complete(2), 
 297:                        failed(3) 
 298:                    } 
 299:        MAX-ACCESS  read-only 
 300:        STATUS      current 
 301:        DESCRIPTION 
 302:                "InProgress(1) indicates a firewall configuration 
 303:                 file download is underway. Complete(2) indicates 
 304:                 the firewall configuration file was downloaded 
 305:                 and processed successfully. Failed(3) indicates 
 306:                 that the last attempted firewall configuration 
 307:                 file download or processing failed." 
 308:        ::= { cabhSec2FwBase 4 } 
 309: 
 310:    cabhSec2FwPolicyFileCurrentVersion OBJECT-TYPE 
 311:        SYNTAX      SnmpAdminString 
 312:        MAX-ACCESS  read-write 
 313:        STATUS      current 
 314:        DESCRIPTION 
 315:           "The configured ruleset currently loaded in the PS 
 316:            regardless if it is enabled or disabled. The PS MUST 
 317:            return a string descriptive of the current ruleset. 
 318:            If there is no configured ruleset, this object 
 319:            contains the string 'factory_default'." 
 320:        DEFVAL { "factory_Default" } 
 321:        ::= { cabhSec2FwBase 5 } 
 322:     
 323:     
 324:    cabhSec2FwClearPreviousRuleset OBJECT-TYPE 
 325:        SYNTAX      INTEGER    { 
 326:                       increment(1), 
 327:                       complete(2) 
 328:                     } 
 329:        MAX-ACCESS  read-write 
 330:        STATUS      current 
 331:        DESCRIPTION 
 332:                "If set to 'complete', the PS must purge all previous  
 333:                firewall rules configured by the cable operator before  
 334:                applying the new rules contained within the configuration  
 335:                file, otherwise the firewall rules in the configuration  
 336:                file are incremental to the previously established  
 337:                configured ruleset." 
 338:        DEFVAL { increment } 
 339:        ::= { cabhSec2FwBase 6 } 
 340:     
 341:    cabhSec2PolicySelection  OBJECT-TYPE 
 342:        SYNTAX      INTEGER { 
 343:                       factoryDefault(1), 
 344:                       configuredRuleset(2) 
 345:                    } 
 346:        MAX-ACCESS  read-write 
 347:        STATUS      current 
 348:        DESCRIPTION 
 349:                "This parameter indicates which policy should currently 
 350:    be 
 351:                running in the firewall, either the factoryDefault policy 
 352:                or the configuredRuleset." 
 353:        DEFVAL { factoryDefault } 
 354:        ::= { cabhSec2FwBase 7 } 
 355:         
 356:    cabhSec2FwEventSetToFactory  OBJECT-TYPE 
 357:        SYNTAX      TruthValue 
 358:        MAX-ACCESS  read-write 
 359:        STATUS      current 
 360:        DESCRIPTION 
 361:                "If set to 'true', entries in cabhSec2FwEventControlEntry 
 362:                are set to their default values.  
 363:                Reading this value always returns false." 
 364:        DEFVAL { false } 
 365:        ::= { cabhSec2FwBase 8 } 
 366:     
 367:     
 368:    cabhSec2FwEventSetToFactoryLastReset OBJECT-TYPE 
 369:        SYNTAX       TimeStamp 
 370:        MAX-ACCESS   read-only 
 371:        STATUS       current 
 372:        DESCRIPTION 
 373:               "The value of sysUpTime when cabhSec2FwEventSetToFactory 
 374:    was 
 375:               Last set to true. Zero if never reset." 
 376:        ::= { cabhSec2FwBase 9 } 
 377:     
 378:     
 379:    -- +++++++++++ 
 380:     
 381:    -- 
 382:    -- CableHome 1.1 Firewall Event MIBS 
 383:    -- 
 384:     
 385:     
 386:    cabhSec2FwEventControlTable OBJECT-TYPE 
 387:        SYNTAX      SEQUENCE OF CabhSec2FwEventControlEntry 
 388:        MAX-ACCESS  not-accessible 
 389:        STATUS      current 
 390:        DESCRIPTION 
 391:           "This table controls the reporting of the 
 392:            Firewall Attacks events" 
 393:        ::= { cabhSec2FwEvent 1 } 
 394:     
 395:     
 396:    cabhSec2FwEventControlEntry OBJECT-TYPE 
 397:        SYNTAX      CabhSec2FwEventControlEntry 
 398:        MAX-ACCESS  not-accessible 
 399:        STATUS      current 
 400:        DESCRIPTION 
 401:                "Allows configuration of the reporting mechanisms 
 402:                 for a particular type of attack." 
 403:        INDEX { cabhSec2FwEventType } 
 404:        ::= { cabhSec2FwEventControlTable 1 } 
 405:     
 406:    CabhSec2FwEventControlEntry ::= SEQUENCE { 
 407:        cabhSec2FwEventType        INTEGER, 
 408:        cabhSec2FwEventEnable      INTEGER, 
 409:        cabhSec2FwEventThreshold   Unsigned32, 
 410:        cabhSec2FwEventInterval    Unsigned32, 
 411:        cabhSec2FwEventCount       ZeroBasedCounter32, 
 412:        cabhSec2FwEventLogReset    TruthValue, 
 413:        cabhSec2FwEventLogLastReset TimeStamp   
 414:     
 415:        } 
 416:     
 417:    cabhSec2FwEventType OBJECT-TYPE 
 418:        SYNTAX INTEGER     { 
 419:                  type1(1), 
 420:                  type2(2), 
 421:                  type3(3), 
 422:                  type4(4), 
 423:                  type5(5), 
 424:                  type6(6) 
 425:               } 
 426:        MAX-ACCESS  not-accessible 
 427:        STATUS      current 
 428:        DESCRIPTION 
 429:                "Classification of the different types of 
 430:                attacks.  
 431:                Type 1  logs all attempts from both LAN and WAN 
 432:                clients to traverse the Firewall that violate the 
 433:                Security Policy.  
 434:                Type 2 logs identified Denial of Service attack 
 435:                attempts.  
 436:                Type 3 logs all changes made to the 
 437:                cabhSec2FwPolicyFileURL,  
 438:                cabhSec2FwPolicyFileCurrentVersion or  
 439:                cabhSec2FwPolicyFileEnable objects.  
 440:                Type 4 logs all failed attempts to modify  
 441:                cabhSec2FwPolicyFileURL and 
 442:                cabhSec2FwPolicyFileEnable objects.  
 443:                Type 5 logs allowed inbound packets from the WAN.  
 444:                Type 6 logs allowed outbound packets from the 
 445:                LAN." 
 446:        ::= { cabhSec2FwEventControlEntry 1 } 
 447:     
 448:    cabhSec2FwEventEnable OBJECT-TYPE 
 449:        SYNTAX      INTEGER    { 
 450:                       enabled(1), 
 451:                       disabled(2) 
 452:                     } 
 453:        MAX-ACCESS  read-write 
 454:        STATUS      current 
 455:        DESCRIPTION 
 456:                "Enables or disables counting and logging of 
 457:                 firewall events by type as assigned by 
 458:                 cabhSec2FwEventType." 
 459: 
 460:        DEFVAL { disabled }  
 461:        ::= { cabhSec2FwEventControlEntry 2 } 
 462:     
 463:     
 464:    cabhSec2FwEventThreshold OBJECT-TYPE 
 465:        SYNTAX       Unsigned32 (0..65535) 
 466:        MAX-ACCESS   read-write 
 467:        STATUS       current 
 468:        DESCRIPTION 
 469:                "Number of attacks to count before sending the 
 470:                 appropriate event by type as assigned by 
 471:                 cabhSec2FwEventType." 
 472:        DEFVAL {0}  
 473:        ::= { cabhSec2FwEventControlEntry 3 } 
 474:     
 475:     
 476:    cabhSec2FwEventInterval OBJECT-TYPE 
 477:        SYNTAX       Unsigned32 (0..65535) 
 478:        UNITS        "hours" 
 479:        MAX-ACCESS   read-write 
 480:        STATUS      current 
 481:        DESCRIPTION 
 482:                "Indicates the time interval in hours to count 
 483:                 and log occurrences of a firewall event type as 
 484:                 assigned in cabhSec2FwEventType. If this MIB has 
 485:                 a value of zero then there is no interval assigned 
 486:                 and the PS will not count or log events." 
 487:        DEFVAL {0}  
 488:        ::= { cabhSec2FwEventControlEntry 4 } 
 489:     
 490:    cabhSec2FwEventCount OBJECT-TYPE 
 491:        SYNTAX       ZeroBasedCounter32 
 492:        MAX-ACCESS   read-only 
 493:        STATUS       current 
 494:        DESCRIPTION 
 495:                "Indicates the current count up to the  
 496:                 cabhSec2FwEventThreshold value by type as 
 497:                 assigned by cabhSec2FwEventType." 
 498:        ::= { cabhSec2FwEventControlEntry 5 } 
 499:     
 500:     
 501:    cabhSec2FwEventLogReset OBJECT-TYPE 
 502:        SYNTAX       TruthValue 
 503:        MAX-ACCESS   read-write 
 504:        STATUS       current 
 505:        DESCRIPTION 
 506:                "Setting this object to true clears the log table 
 507:                 for the specified event type. Reading this object 
 508:                 always returns false." 
 509:        DEFVAL {false} 
 510:        ::= { cabhSec2FwEventControlEntry 6 } 
 511:     
 512:     
 513:    cabhSec2FwEventLogLastReset     OBJECT-TYPE 
 514:        SYNTAX       TimeStamp 
 515:        MAX-ACCESS   read-only 
 516:        STATUS       current 
 517:        DESCRIPTION 
 518:                "The value of sysUpTime when cabhSec2FwEventLogReset was  
 519:                 last set to true. Zero if never reset." 
 520:        ::= { cabhSec2FwEventControlEntry 7 } 
 521:     
 522:     
 523:     
 524:    -- 
 525:    -- CableHome 1.1 Firewall Log Tables 
 526:    --  
 527:    cabhSec2FwLogTable OBJECT-TYPE 
 528:        SYNTAX      SEQUENCE OF CabhSec2FwLogEntry 
 529:        MAX-ACCESS  not-accessible 
 530:        STATUS      current 
 531:        DESCRIPTION 
 532:                "Contains a log of packet information as related 
 533:                 to events enabled by the cable operator. The types 
 534:                 are defined in the CableHome 1.1 specification and 
 535:                 require various objects to be included in the log. 
 536:                 The following is a description for what is 
 537:                 expected in the log for each type Type 1, Type 2, 
 538:                 Type 5 and Type 6 table MUST include 
 539:                 cabhSec2FwEventType, cabhSec2FwEventPriority, 
 540:                 cabhSec2FwEventId, cabhSec2FwLogTime, 
 541:                 cabhSec2FwIpProtocol, cabhSec2FwIpSourceAddr, 
 542:                 cabhSec2FwIpDestAddr, cabhSec2FwIpSourcePort, 
 543:                 cabhSec2FwIpDestPort, cabhSec2Fw, 
 544:                 cabhSec2FwReplayCount.  The other values not used 
 545:                 by type 1, 2, 5 & 6 are default values. Type 3 & 
 546:                 Type 4 MUST include cabhSec2FwEventType, 
 547:                 cabhSec2FwEventPriority, cabhSec2FwEventId, 
 548:                 cabhSec2FwLogTime, cabhSec2FwIpSourceAddr, 
 549:                 cabhSec2FwLogMIBPointer.  The other values not used 
 550:                 by type 3 and 4 are default values." 
 551:        ::= { cabhSec2FwLog 1 } 
 552:     
 553:    cabhSec2FwLogEntry OBJECT-TYPE 
 554:        SYNTAX      CabhSec2FwLogEntry 
 555:        MAX-ACCESS  not-accessible 
 556:        STATUS      current 
 557:        DESCRIPTION 
 558:                "Each entry contains the log of firewall events" 
 559:        INDEX {cabhSec2FwLogIndex}             
 560:        ::= { cabhSec2FwLogTable 1 } 
 561:     
 562:    CabhSec2FwLogEntry ::= SEQUENCE { 
 563:        cabhSec2FwLogIndex             Unsigned32, 
 564:        cabhSec2FwLogEventType         INTEGER, 
 565:        cabhSec2FwLogEventPriority     INTEGER, 
 566:        cabhSec2FwLogEventId           Unsigned32, 
 567:        cabhSec2FwLogTime              DateAndTime, 
 568:        cabhSec2FwLogIpProtocol        Unsigned32, 
 569:        cabhSec2FwLogIpSourceAddr      InetAddress, 
 570:        cabhSec2FwLogIpDestAddr        InetAddress, 
 571:        cabhSec2FwLogIpSourcePort      InetPortNumber, 
 572:        cabhSec2FwLogIpDestPort        InetPortNumber, 
 573:        cabhSec2FwLogMessageType       Unsigned32, 
 574:        cabhSec2FwLogReplayCount       Unsigned32, 
 575:        cabhSec2FwLogMIBPointer           VariablePointer 
 576:    } 
 577:     
 578:    cabhSec2FwLogIndex OBJECT-TYPE 
 579:        SYNTAX      Unsigned32 (1..2147483647) 
 580:        MAX-ACCESS  not-accessible 
 581:        STATUS      current 
 582:        DESCRIPTION 
 583:                "A sequence number for the specific events 
 584:                 under a cabhSec2FwEventType."  
 585:        ::= { cabhSec2FwLogEntry 1 } 
 586:     
 587:    cabhSec2FwLogEventType OBJECT-TYPE 
 588:        SYNTAX INTEGER     { 
 589:                  type1(1), 
 590:                  type2(2), 
 591:                  type3(3), 
 592:                  type4(4), 
 593:                  type5(5), 
 594:                  type6(6) 
 595:                } 
 596:        MAX-ACCESS  read-only  
 597:        STATUS      current 
 598:        DESCRIPTION 
 599:                "Classification of the different types of 
 600:                 attacks. 
 601:                 Type 1 logs all attempts from both LAN and WAN 
 602:                 clients to traverse the Firewall that violate 
 603:                 the Security Policy. 
 604:                 Type 2 logs identified Denial of Service attack 
 605:                 attempts. 
 606:                 Type 3 logs all changes made to the 
 607:                 cabhSec2FwPolicyFileURL, 
 608:                 cabhSec2FwPolicyFileCurrentVersion or 
 609:                 cabhSec2FwPolicyFileEnable objects. 
 610:                 Type 4 logs all failed attempts to modify 
 611:                 cabhSec2FwPolicyFileURL and 
 612:                 cabhSec2FwPolicyFileEnable objects. 
 613:                 Type 5 logs allowed inbound packets from the WAN. 
 614:                 Type 6 logs allowed outbound packets from the 
 615:                 LAN." 
 616:        ::= { cabhSec2FwLogEntry 2 } 
 617:     
 618:    cabhSec2FwLogEventPriority OBJECT-TYPE 
 619:        SYNTAX     INTEGER     { 
 620:                      emergency(1), 
 621:                      alert(2), 
 622:                      critical(3), 
 623:                      error(4), 
 624:                      warning(5), 
 625:                      notice(6), 
 626:                      information(7), 
 627:                      debug(8) 
 628:                   } 
 629:        MAX-ACCESS  read-only 
 630:        STATUS      current 
 631:        DESCRIPTION 
 632:                "The priority level of this event as defined 
 633:                 by CableHome Specification. If a priority is 
 634:                 not assigned in the CableHome specification for 
 635:                 a particular event then the vendor or cable 
 636:                 operator may assign priorities. These are 
 637:                 ordered from most serious (emergency)to least 
 638:                 serious (debug)." 
 639:        ::= { cabhSec2FwLogEntry 3 } 
 640:     
 641:     
 642:    cabhSec2FwLogEventId  OBJECT-TYPE 
 643:        SYNTAX      Unsigned32 
 644:        MAX-ACCESS  read-only 
 645:        STATUS      current 
 646:        DESCRIPTION 
 647:                "The assigned event ID." 
 648:        ::= { cabhSec2FwLogEntry 4 } 
 649:     
 650:     
 651:    cabhSec2FwLogTime OBJECT-TYPE 
 652:        SYNTAX      DateAndTime 
 653:        MAX-ACCESS  read-only 
 654:        STATUS      current 
 655:        DESCRIPTION 
 656:                "The time that this entry was created by the PS." 
 657:        ::= { cabhSec2FwLogEntry 5 } 
 658: 
 659:    cabhSec2FwLogIpProtocol OBJECT-TYPE 
 660:        SYNTAX      Unsigned32 (0..256) 
 661:        MAX-ACCESS  read-only 
 662:        STATUS      current 
 663:        DESCRIPTION 
 664:                "The IP Protocol" 
 665:        ::= { cabhSec2FwLogEntry 6 } 
 666:     
 667:     
 668:    cabhSec2FwLogIpSourceAddr OBJECT-TYPE 
 668: warning - warning: `InetAddress' object should have an accompanied preceding `InetAdressType' object
 669:        SYNTAX      InetAddress 
 670:        MAX-ACCESS  read-only 
 671:        STATUS      current 
 672:        DESCRIPTION 
 673:                "The Source IP Address of the packet logged" 
 674:        ::= { cabhSec2FwLogEntry 7 } 
 675:     
 676:     
 677:    cabhSec2FwLogIpDestAddr OBJECT-TYPE 
 677: warning - warning: `InetAddress' object should have an accompanied preceding `InetAdressType' object
 678:        SYNTAX      InetAddress 
 679:        MAX-ACCESS  read-only 
 680:        STATUS      current 
 681:        DESCRIPTION 
 682:                "The Destination IP Address of the packet logged" 
 683:        ::= { cabhSec2FwLogEntry 8 } 
 684:     
 685:     
 686:    cabhSec2FwLogIpSourcePort OBJECT-TYPE 
 687:        SYNTAX      InetPortNumber 
 688:        MAX-ACCESS  read-only 
 689:        STATUS      current 
 690:        DESCRIPTION 
 691:                "The Source IP Port of the packet logged" 
 692:        ::= { cabhSec2FwLogEntry 9 } 
 693:     
 694:     
 695:    cabhSec2FwLogIpDestPort OBJECT-TYPE 
 696:        SYNTAX      InetPortNumber 
 697:        MAX-ACCESS  read-only 
 698:        STATUS      current 
 699:        DESCRIPTION 
 700:                "The Source IP Port of the packet logged" 
 701:        ::= { cabhSec2FwLogEntry 10 } 
 702:     
 703:    cabhSec2FwLogMessageType OBJECT-TYPE 
 704:        SYNTAX      Unsigned32 
 705:        MAX-ACCESS  read-only 
 706:        STATUS      current 
 707:        DESCRIPTION 
 708:                "The ICMP defined types." 
 709:        ::= { cabhSec2FwLogEntry 11} 
 710:     
 711:     
 712:    cabhSec2FwLogReplayCount OBJECT-TYPE 
 713:        SYNTAX      Unsigned32 
 714:        MAX-ACCESS  read-only 
 715:        STATUS      current 
 716:        DESCRIPTION 
 717:            "The number of identical attack packets that 
 718:             were seen by the firewall based on 
 719:             cabhSec2FwLogIpProtocol, cabhSec2FwLogIpSourceAddr, 
 720:             cabhSec2FwLogIpDestAddr, cabhSec2FwLogIpSourcePort, 
 721:             cabhSec2FwLogIpDestPort and cabhSec2FwLogMessageType" 
 722:        DEFVAL { 0 } 
 723:        ::= { cabhSec2FwLogEntry 12 } 
 724:     
 725:    cabhSec2FwLogMIBPointer OBJECT-TYPE 
 726:        SYNTAX      VariablePointer  
 727:        MAX-ACCESS  read-only 
 728:        STATUS      current 
 729:        DESCRIPTION 
 730:               "Identifies if the cabhSec2FwPolicyFileURL or the  
 731:                cabhSec2FwEnable MIB object changed or an attempt 
 732:                was made to change it." 
 733:        DEFVAL { zeroDotZero } 
 734:        ::= { cabhSec2FwLogEntry 13 } 
 735:     
 736:     
 737:    -- ============================================================ 
 738:    -- 
 739:    --  CableHome 1.1 PS IP Filter Scheduling Table 
 740:    -- 
 741:    --  The cabhSec2FwFilterScheduleTable contains the firewall 
 742:    --  policy identification and links that policy as defined 
 743:    --  in RFC 2669 to specific time of day restrictions. 
 744:    -- 
 745:    -- ============================================================= 
 746:     
 747:    cabhSec2FwFilterScheduleTable OBJECT-TYPE 
 748:        SYNTAX SEQUENCE OF CabhSec2FwFilterScheduleEntry 
 749:        MAX-ACCESS    not-accessible 
 750:        STATUS        current 
 751:        DESCRIPTION  
 752:              "Contains the link between the firewall 
 753:               rule and the  associated time of day. 
 754:               This table is compared based on a filter ruleset 
 755:               configured with docsDevFilterControl value of 'policy' and  
 756:               docsDevFilterPolicyId value not zero. A packet matching 
 757:    this 
 758:               Table time constrains is accepted for further processing" 
 759:        ::= { cabhSec2FwFilter 1 } 
 760:     
 761:     
 762:    cabhSec2FwFilterScheduleEntry OBJECT-TYPE 
 763:        SYNTAX CabhSec2FwFilterScheduleEntry 
 764:        MAX-ACCESS not-accessible 
 765:        STATUS current 
 766:        DESCRIPTION 
 767:           "List of IP firewall policies linked to time of day" 
 768:        INDEX { cabhSec2FwFilterScheduleIndex } 
 769:        ::= { cabhSec2FwFilterScheduleTable 1 } 
 770:     
 771:     
 772:    CabhSec2FwFilterScheduleEntry ::= SEQUENCE { 
 773:        cabhSec2FwFilterScheduleIndex        Unsigned32, 
 774:        cabhSec2FwFilterScheduleRowStatus    RowStatus, 
 775:        cabhSec2FwFilterScheduleStartTime    DateAndTime, 
 776:        cabhSec2FwFilterScheduleEndTime      DateAndTime, 
 777:        cabhSec2FwFilterScheduleDOW          BITS 
 778:        } 
 779:     
 780:    cabhSec2FwFilterScheduleIndex    OBJECT-TYPE 
 781:        SYNTAX                  Unsigned32 (1..65535) 
 782:        MAX-ACCESS              not-accessible 
 783:        STATUS                  current 
 784:        DESCRIPTION 
 785:                "Index for the Time Entry table." 
 786:        ::= { cabhSec2FwFilterScheduleEntry 1 } 
 787:     
 788:     
 789:    cabhSec2FwFilterScheduleRowStatus    OBJECT-TYPE 
 790:        SYNTAX            RowStatus 
 791:        MAX-ACCESS    read-create 
 792:        STATUS            current 
 793:        DESCRIPTION 
 794:               "The Row Status interlock for creation and 
 795:                deletion of row entries. Any object in each 
 796:                row can be modified at any time while the row 
 797:                is active (1)."  
 798:        ::={ cabhSec2FwFilterScheduleEntry 2 } 
 799:     
 800:     
 801:    cabhSec2FwFilterScheduleStartTime OBJECT-TYPE 
 802:        SYNTAX         DateAndTime 
 803:        MAX-ACCESS     read-create 
 804:        STATUS        current 
 805:        DESCRIPTION 
 806:                "The start time, with optional time zone, 
 807:                 for a firewall filter ruleset."  
 808:        ::= { cabhSec2FwFilterScheduleEntry 3 } 
 809: 
 810:    cabhSec2FwFilterScheduleEndTime OBJECT-TYPE 
 811:        SYNTAX            DateAndTime 
 812:        MAX-ACCESS        read-create 
 813:        STATUS            current 
 814:        DESCRIPTION 
 815:                "The end time, with optional time zone, 
 816:                 for a firewall filter ruleset."  
 817:        ::= { cabhSec2FwFilterScheduleEntry 4 } 
 818:     
 819:     
 820:    cabhSec2FwFilterScheduleDOW OBJECT-TYPE 
 821:        SYNTAX BITS { 
 822:                 sunday(0), 
 823:                 monday(1), 
 824:                 tuesday(2), 
 825:                 wednesday(3), 
 826:                 thursday(4), 
 827:                 friday(5), 
 828:                 saturday(6) 
 829:               } 
 830:        MAX-ACCESS   read-create 
 831:        STATUS       current 
 832:        DESCRIPTION 
 833:                "The day of week to be used with the IP filter 
 834:                 table from RFC2669. 
 835:                 If the day of week bit associated with the PS given day  
 836:                 is '1',  this object criteria matches." 
 837:        ::= { cabhSec2FwFilterScheduleEntry 5 } 
 838:     
 839:    -- 
 840:    -- Kerberos MIBs 
 841:    -- 
 842:     
 843:     
 844:    cabhSecKerbPKINITGracePeriod    OBJECT-TYPE 
 845:        SYNTAX                  Unsigned32 (15..600) 
 846:        UNITS                   "minutes" 
 847:        MAX-ACCESS              read-write 
 848:        STATUS                  current 
 849:        DESCRIPTION 
 850:                "The PKINIT Grace Period is needed by the PS 
 851:                 to know when it should start retrying to get 
 852:                 a new ticket. The PS MUST obtain a new Kerberos 
 853:                 ticket (with a PKINIT exchange)this many minutes 
 854:                 before the old ticket expires. The minimum 
 855:                 allowed value is 15 minutes. The default value 
 856:                 is 30 minutes." 
 857:        DEFVAL { 30 } 
 858:        ::= { cabhSecKerbBase 1} 
 859:        cabhSecKerbTGSGracePeriod    OBJECT-TYPE 
 860:        SYNTAX            Unsigned32 (15..600) 
 861:        UNITS             "minutes" 
 862:        MAX-ACCESS        read-write 
 863:        STATUS            current 
 864:        DESCRIPTION 
 865:                "The TGS Grace Period is needed by the PS to 
 866:                 know when it should start retrying to get a new 
 867:                 ticket. The PS MUST obtain a new Kerberos ticket 
 868:                 (with a TGS Request) this many minutes before the 
 869:                 old ticket expires. The minimum allowed value is 
 870:                 15 minutes. The default value is 30 minutes." 
 871:        DEFVAL { 30 } 
 872:        ::= { cabhSecKerbBase 2} 
 873:     
 874:    cabhSecKerbUnsolicitedKeyMaxTimeout    OBJECT-TYPE 
 875:        SYNTAX            Unsigned32 (15..600) 
 876:        UNITS             "seconds" 
 877:        MAX-ACCESS        read-write 
 878:        STATUS            current 
 879:        DESCRIPTION 
 880:                "This timeout applies to PS initiated AP-REQ/REP 
 881:                 key management exchange with NMS. The maximum 
 882:                 timeout is the value which may not be exceeded in 
 883:                 the exponential backoff algorithm. The minimum 
 884:                 allowed value is 15 minutes. The default value 
 885:                 is 600 minutes." 
 886:        DEFVAL { 600 } 
 887:        ::= { cabhSecKerbBase 3} 
 888:     
 889:     
 890:    cabhSecKerbUnsolicitedKeyMaxRetries    OBJECT-TYPE 
 891:        SYNTAX              Unsigned32 (1..32) 
 892:        MAX-ACCESS          read-write 
 893:        STATUS              current 
 894:        DESCRIPTION 
 895:                "The number of retries the PS is allowed for 
 896:                 AP-REQ/REP key management exchange initiation 
 897:                 with the NMS. This is the maximum number of 
 898:                 retries before the PS gives up attempting to 
 899:                 establish an SNMPv3 security association  
 900:                 with NMS." 
 901:        DEFVAL { 8 } 
 902:          ::= { cabhSecKerbBase 4} 
 903:     
 904:     
 905:     cabhSecNotification OBJECT IDENTIFIER ::= { cabhSecMib 2 } 
 906:     cabhSecConformance  OBJECT IDENTIFIER ::= { cabhSecMib 3 } 
 907:     cabhSecCompliances  OBJECT IDENTIFIER ::= { cabhSecConformance 1 } 
 908:     cabhSecGroups       OBJECT IDENTIFIER ::= { cabhSecConformance 2 } 
 909:     
 910:    -- 
 911:    --    Notification Group for future extension 
 912:    -- 
 913:     
 914:    -- compliance statements 
 915:     
 916:        cabhSecCompliance MODULE-COMPLIANCE 
 917:        STATUS     current 
 918:        DESCRIPTION 
 919:           "The compliance statement for CableHome Security." 
 920:        MODULE   --cabhSecMib 
 921:     
 922:     
 923:     
 924:    -- unconditionally mandatory groups 
 925:     
 926:    MANDATORY-GROUPS { 
 927:    --      cabhSecGroup,   
 928:            cabhSecCertGroup, 
 929:            cabhSecKerbGroup 
 930:            } 
 931:     
 932:     
 933:    -- conditional mandatory groups 
 934:            
 935:    GROUP cabhSecGroup 
 936:        DESCRIPTION 
 937:             "This group is implemented only for CH 1.0 gateways." 
 938:         
 939:              
 940:    GROUP  cabhSec2Group 
 941:        DESCRIPTION 
 942:              "This group is implemented only for CH 1.1 gateways." 
 943:     
 944:    ::= { cabhSecCompliances 1} 
 945:                 
 946:    cabhSecGroup OBJECT-GROUP 
 947:        OBJECTS { 
 948:            cabhSecFwPolicyFileEnable, 
 949:            cabhSecFwPolicyFileURL, 
 950:            cabhSecFwPolicyFileHash, 
 951:            cabhSecFwPolicyFileOperStatus, 
 952:            cabhSecFwPolicyFileCurrentVersion, 
 953:              
 954:            cabhSecFwEventType1Enable, 
 955:            cabhSecFwEventType2Enable, 
 956:            cabhSecFwEventType3Enable, 
 957:            cabhSecFwEventAttackAlertThreshold, 
 958:            cabhSecFwEventAttackAlertPeriod 
 959:         } 
 960:        STATUS    current 
 961:        DESCRIPTION 
 962:                "Group of objects in CableHome 1.0 Firewall MIB." 
 963:        ::= { cabhSecGroups 1 }  
 964:     
 965:     
 966:    cabhSecCertGroup OBJECT-GROUP 
 967:        OBJECTS {  
 968:            cabhSecCertPsCert 
 969:        } 
 970:        STATUS    current 
 971:        DESCRIPTION 
 972:            "Group of objects in CableHome gateway for PS 
 973:             Certificate." 
 974:        ::= { cabhSecGroups 2 }  
 975:     
 976:     
 977:    cabhSecKerbGroup OBJECT-GROUP 
 978:        OBJECTS { 
 979:            cabhSecKerbPKINITGracePeriod, 
 980:            cabhSecKerbTGSGracePeriod, 
 981:            cabhSecKerbUnsolicitedKeyMaxTimeout, 
 982:            cabhSecKerbUnsolicitedKeyMaxRetries 
 983:        } 
 984:        STATUS    current 
 985:        DESCRIPTION 
 986:            "Group of objects in CableHome gateway for Kerberos." 
 987:        ::= { cabhSecGroups 3 } 
 988:     
 989:    cabhSec2Group OBJECT-GROUP 
 990:        OBJECTS { 
 991:            cabhSec2FwEnable, 
 992:            cabhSec2FwPolicyFileURL, 
 993:            cabhSec2FwPolicyFileHash, 
 994:            cabhSec2FwPolicyFileOperStatus, 
 995:            cabhSec2FwPolicyFileCurrentVersion, 
 996:            cabhSec2FwClearPreviousRuleset, 
 997:            cabhSec2PolicySelection, 
 998:            cabhSec2FwEventSetToFactory, 
 999:            cabhSec2FwEventSetToFactoryLastReset, 
1000:            cabhSec2FwEventEnable, 
1001:            cabhSec2FwEventThreshold, 
1002:            cabhSec2FwEventInterval, 
1003:            cabhSec2FwEventCount, 
1004:            cabhSec2FwEventLogReset, 
1005:            cabhSec2FwEventLogLastReset, 
1006:            cabhSec2FwLogEventType, 
1007:            cabhSec2FwLogEventPriority, 
1008:            cabhSec2FwLogEventId, 
1009:            cabhSec2FwLogTime, 
1010:            cabhSec2FwLogIpProtocol, 
1011:            cabhSec2FwLogIpSourceAddr, 
1012:            cabhSec2FwLogIpDestAddr, 
1013:            cabhSec2FwLogIpSourcePort, 
1014:            cabhSec2FwLogIpDestPort, 
1015:            cabhSec2FwLogMessageType, 
1016:            cabhSec2FwLogReplayCount, 
1017:            cabhSec2FwLogMIBPointer, 
1018:            cabhSec2FwFilterScheduleRowStatus, 
1019:            cabhSec2FwFilterScheduleStartTime, 
1020:            cabhSec2FwFilterScheduleEndTime, 
1021:            cabhSec2FwFilterScheduleDOW 
1022:            } 
1023:        STATUS    current 
1024:        DESCRIPTION 
1025:            "Group of objects in CableHome 1.1 Firewall MIB." 
1026:        ::= { cabhSecGroups 4 }  
1027:     
1028:    END 
1029: 
1030: --  
1031: --    Copyright (C) The Internet Society (2003). All Rights Reserved. 
1032: --     
1033: --    This document and translations of it may be copied and furnished to 
1034: --    others, and derivative works that comment on or otherwise explain it 
1035: --    or assist in its implementation may be prepared, copied, published 
1036: --    and distributed, in whole or in part, without restriction of any 
1037: --    kind, provided that the above copyright notice and this paragraph are 
1038: --    included on all such copies and derivative works.  However, this 
1039: --    document itself may not be modified in any way, such as by removing 
1040: --    the copyright notice or references to the Internet Society or other 
1041: --    Internet organizations, except as needed for the purpose of 
1042: --    developing Internet standards in which case the procedures for 
1043: --    copyrights defined in the Internet Standards process must be 
1044: --    followed, or as required to translate it into languages other than 
1045: --    English. 
1046: --     
1047: --    The limited permissions granted above are perpetual and will not be 
1048: --    revoked by the Internet Society or its successors or assigns. 
1049: --    This document and the information contained herein is provided on an 
1050: --    "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING 
1051: --    TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING 
1052: --    BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION 
1053: --    HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF 
1054: --    MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE." 
1055: