Internet Draft J. Quittek Document: draft-ietf-midcom-mib-00.txt M. Stiemerling Expires: July 2004 NEC Europe Ltd. P. Srisuresh Caymas Systems January 2004 Definitions of Managed Objects for Middlebox Communication Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC 2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html Distribution of this document is unlimited. Copyright Notice Copyright (C) The Internet Society (2004). All Rights Reserved. Abstract This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes a set of managed objects that allow configuring middleboxes, such as firewalls and network address translators, in order to enable communication across these devices. The definitions of managed objects in this documents follow closely the MIDCOM semantics defined in RFC XXXX. Quittek, Stiemerling, Srisuresh [Page 1] Internet-Draft MIDCOM MIB January 2004 Table of Contents 1 Introduction ................................................. 3 2 The Internet-Standard Management Framework ................... 3 3 Overview ..................................................... 3 3.1 Terminology ................................................ 4 4 Realizing the MIDCOM Protocol with SNMP ...................... 4 4.1 MIDCOM Sessions ............................................ 4 4.1.1 Authentication and Authorization ......................... 5 4.2 MIDCOM Transactions ........................................ 5 4.2.1 Asynchronous Transactions ................................ 6 4.2.2 Configuration Transactions ............................... 6 4.2.3 Monitoring Transactions .................................. 9 4.2.4 Atomicity of Transactions ................................ 10 4.2.4.1 Asynchronous Transactions .............................. 10 4.2.4.2 Session Establishment and Termination Transactions ..... 10 4.2.4.3 Monitoring Transactions ................................ 11 4.2.4.4 Lifetime Change Transactions ........................... 11 4.2.4.5 Transactions Establishing New Policy Rules ............. 11 4.2.5 Access Control ........................................... 12 4.3 Access Control Policies .................................... 12 5 Structure of the MIB module .................................. 13 5.1 Signaling Objects .......................................... 13 5.1.1 midcomSession ............................................ 13 5.1.2 midcomRuleTable .......................................... 14 5.1.3 midcomGroupTable ......................................... 17 5.2 Configuration Objects ...................................... 17 5.2.1 Capabilities ............................................. 18 5.2.2 midcomConfigFirewallTable ................................ 19 5.3 Monitoring Objects ......................................... 19 5.3.1 midcomResourceTable ...................................... 19 5.3.2 midcomStatistics ......................................... 20 5.4 Notifications .............................................. 22 6 Usage Examples ............................................... 22 6.1 Session Establishment (SE) ................................. 23 6.2 Session Termination (ST) ................................... 23 6.3 Asynchronous Session Termination (AST) ..................... 24 6.4 Policy Reserve Rule (PRR) .................................. 24 6.5 Policy Enable Rule (PER) after PRR ......................... 25 6.6 Policy Enable Rule (PER) without previous PRR .............. 26 6.7 Policy Rule Lifetime Change (RLC) .......................... 27 6.8 Policy Rule List (PRL) ..................................... 27 6.9 Policy Rule Status (PRS) ................................... 27 6.10 Asynchronous Policy Rule Event (ARE) ...................... 27 6.11 Group Lifetime Change (GLC) ............................... 28 6.12 Group List (GL) ........................................... 28 6.13 Group Status (GS) ......................................... 28 7 Definitions .................................................. 28 8 Security Considerations ...................................... 73 9 Acknowledgements ............................................. 73 Quittek, Stiemerling, Srisuresh [Page 2] Internet-Draft MIDCOM MIB January 2004 10 Open Issues ................................................. 73 11 Normative References ........................................ 74 12 Informative References ...................................... 75 13 Authors' Addresses .......................................... 75 14 IPR Notices ................................................. 76 15 Full Copyright Statement .................................... 76 1. Introduction This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes a set of managed objects that allow controlling middleboxes. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. 2. The Internet-Standard Management Framework For a detailed overview of the documents that describe the current Internet-Standard Management Framework, please refer to section 7 of RFC 3410 [RFC3410]. Managed objects are accessed via a virtual information store, termed the Management Information Base or MIB. MIB objects are generally accessed through the Simple Network Management Protocol (SNMP). Objects in the MIB are defined using the mechanisms defined in the Structure of Management Information (SMI). This memo specifies a MIB module that is compliant to the SMIv2, which is described in STD 58, RFC 2578 [RFC2578], STD 58, RFC 2579 [RFC2579] and STD 58, RFC 2580 [RFC2580]. 3. Overview The managed objects defined in this document serve for controlling firewalls and Network Address Translators (NATs). As defined in [RFC3234], firewalls and NATs belong to the group of middleboxes. A middlebox is a device on the datagram path between source and destination, which performs other functions than just IP routing. As outlined in [RFC3303], firewalls and NATs are potential obstacles to packet streams, for example if dynamically negotiated UDP or TCP port numbers are used, as in many peer-to-peer communication applications. As one possible solution for this problem, the IETF MIDCOM working group defined a framework [RFC3303], requirements [RFC3304] and Quittek, Stiemerling, Srisuresh [Page 3] Internet-Draft MIDCOM MIB January 2004 protocol semantics [RFCXXXX] for communication between applications and middleboxes acting as firewalls, NATs or a combination of both. The managed objects defined in this document can be used for dynamically configuring middleboxes on the datagram path in order to enable datagram streams to pass the middlebox. This way, applications can request pinholes at firewalls and address bindings at NATs. Beyond managed objects required serving these applications, there are also managed objects defined that control how application requests are mapped to resources at the middlebox. Since firewalls and NATs are critical devices concerning network security, security issues of middlebox communication need to be considered very carefully. 3.1. Terminology The terminology used in this document is fully aligned with the terminology defined in [RFCXXXX] except for the term 'MIDCOM agent'. For this term there is a conflict between the MIDCOM terminology and the SNMP terminology. The roles of entities participating in SNMP communication are called 'manager' and 'agent' with the agent acting as server for requests from the manager. This use of the term 'agent' is different to its use in the MIDCOM framework: The SNMP manager corresponds to the MIDCOM agent and the SNMP agent corresponds to the MIDCOM middlebox. In order to avoid confusion in this document specifying a MIB module, we replace the term 'MIDCOM agent' by 'MIDCOM client'. Whenever the term 'agent' is used in this document, it refers to the SNMP agent. 4. Realizing the MIDCOM Protocol with SNMP In order to realize middlebox communication as described in RFC XXXX, several aspects and properties of the MIDCOM protocol need to be mapped to SNMP capabilities and expressed in terms of the Structure of Management Information version 2 (SMIv2). Basic concepts to be mapped are MIDCOM sessions and MIDCOM transactions. For both, access control policies need to be supported. 4.1. MIDCOM Sessions SNMP has no direct support for sessions. Therefore, they need to be modeled. A session is stateful and has a context that is valid for several transactions. For SNMP, a context is valid for a single transaction only, for example covering just a single request/reply Quittek, Stiemerling, Srisuresh [Page 4] Internet-Draft MIDCOM MIB January 2004 pair of messages. Properties of sessions that are utilized by the MIDCOM semantics and not avaiable in SNMP need to be modeled. Particularly, the middlebox needs to be able to send notification messages to MIDCOM clients participating in a session. The midcomSessionTable described in more detail in Section 5.1.1 provides this information. Each MIDCOM client that opens a session has to create an entry in the midcomSessionTable. This entry identifies the MIDCOM client as participant of a session and gives the middlebox sufficient information for sending notifications to the client. The MIDCOM-MIB module requires a MIDCOM client to create an entry in the midcomSessionTable before it creates or modifies MIDCOM policy rules. Without creating an entry in the session table, the MIDCOM client cannot create or modify any MIDCOM policy rule and it will not receive any notification indicating state changes at the middlebox. 4.1.1. Authentication and Authorization MIDCOM sessions are required to provide authentication, authorization and encryption for messages exchanged between MIDCOM client and middlebox. SNMPv3 provides these features on a per-message basis instead of a per-session basis. This more fine-grained security based on the User-based Security Model (USM, [RFC3414]) providing authentication and the View-based Access control Model (VACM, [RFC3415]) that can be used for authorization of access to managed objects. This can be considered as overhead compared to per-session security mechanisms, but it completely satisfies the security requirements of middlebox communication. Any MIDCOM client that wants to start a session by creating an entry in the session table needs to authenticate itself as an SNMP user. For the authenticated user, access should be thoroughly configured as part of the VACM configuration of the SNMP agent. 4.2. MIDCOM Transactions RFCXXXX defines the MIDCOM protocol semantics in terms of transactions and transaction parameters. Transactions are grouped into request-reply transactions and asynchronous transactions. SNMP offers simple transactions that in general cannot be mapped one- to-one to MIDCOM transactions. This section describes how the MIDCOM MIB module implements MIDCOM transactions using SNMP transactions. The concerned MIDCOM transactions are asynchronous transactions and request-reply transactions. Within the set of request-reply transactions we distinguish configuration transactions and monitoring transactions, because they are implemented in slightly different ways Quittek, Stiemerling, Srisuresh [Page 5] Internet-Draft MIDCOM MIB January 2004 by using SNMP transactions. 4.2.1. Asynchronous Transactions Asynchronous transactions can easily be modeled by SNMP notifications. An asynchronous transaction contains a notification message with one to three parameters. The message can be realized as an SNMP notification with the parameters implemented as managed objects contained in the notification. +--------------+ notification +------------+ | MIDCOM client|<--------------| middlebox | +--------------+ message +------------+ MIDCOM asynchronous transaction +--------------+ SNMP +------------+ | SNMP manager |<--------------| SNMP agent | +--------------+ notification +------------+ Implementation of MIDCOM asynchronous transaction Figure 1: MIDCOM asynchronous transaction mapped to SNMP notification One of the parameters is the transaction identifier that should be unique per middlebox. It does not have to be unique for all notifications sent by the particular SNMP agent, but for all sent notifications that are defined by the MIDCOM MIB module. 4.2.2. Configuration Transactions All request-reply transactions contain a request message, a reply message and potentially also a set of notifications. In general they cannot be modeled by just having one SNMP message per MIDCOM message, because some of the MIDCOM messages carry a large set of parameters that do not necessarily fit into an SNMP message consisting of a single UDP packet only. For configuration transactions the MIDCOM request message can be modeled by one or more SNMP set transactions. The action of sending the MIDCOM request to the middlebox is realized by writing the parameters contained in the message to managed objects at the SNMP agent. If necessary, the SNMP set transaction includes creating these managed objects. If not all parameters of the MIDCOM request message can be set by a single SNMP set transaction, then more than Quittek, Stiemerling, Srisuresh [Page 6] Internet-Draft MIDCOM MIB January 2004 one set transactions are used, see Figure 2. The last one of these messages must clearly indicate that now all parameters are set and that processing of the MIDCOM request message can start at the middlebox. +--------------+ request +------------+ | MIDCOM client|-------------->| middlebox | +--------------+ message +------------+ MIDCOM request message +--------------+ +------------+ | | SNMP set | | | |-------------->| | | | message | | | | | | | | SNMP set | | | |<--------------| | | | reply message | | | SNMP manager | | SNMP agent | | | SNMP set | | | |- - - - - - - >| | | | message | | | | | | | | SNMP set | | | |< - - - - - - -| | | | reply message | | | | | | | | . . . | | +--------------+ +------------+ Implementation of MIDCOM request message by one or more SNMP set messages Figure 2: MIDCOM request message mapped to SNMP set transactions Please note that a single SNMP set transaction consists of an SNMP set request message and an SNMP set reply message. Both are sent as unreliable UDP packets and may be dropped before they reach their destination. If the SNMP set request message is lost, then the SNMP agent repeats the message after receiving no reply for a specified time. Also if the SNMP set reply message is lost, the SNMP agent retransmit the SNMP set message. But this time, the SNMP agent receives the same message twice and must make sure that it accepts the second message as it did the first one and that it sends an SNMP Quittek, Stiemerling, Srisuresh [Page 7] Internet-Draft MIDCOM MIB January 2004 reply message again. The MIDCOM reply message can be modeled by an SNMP notification transaction optionally followed by one or more SNMP get transactions as shown in Figure 3. The SNMP agent informs the SNMP manager about the end of processing the request by sending an SNMP notification. If possible, the SNMP notification carries all reply parameters. If this is not possible, then the SNMP manager has to perform additional SNMP get transactions as long as is needed to receive all of the reply parameters. +--------------+ reply +------------+ | MIDCOM client|<--------------| middlebox | +--------------+ message +------------+ MIDCOM reply message +--------------+ +------------+ | | SNMP | | | |<--------------| | | | notification | | | | | | | | SNMP get | | | |-------------->| | | | message | | | SNMP manager | | SNMP agent | | | SNMP get | | | |<--------------| | | | reply message | | | | | | | | SNMP get | | | |- - - - - - - >| | | | message | | | | | | | | SNMP get | | | |< - - - - - - -| | | | reply message | | | | | | | | . . . | | +--------------+ +------------+ Implementation of MIDCOM reply message by an SNMP notification and one or more SNMP set messages Figure 3: MIDCOM reply message mapped to SNMP notification and optional get transactions Quittek, Stiemerling, Srisuresh [Page 8] Internet-Draft MIDCOM MIB January 2004 4.2.3. Monitoring Transactions The realization of MIDCOM monitoring transactions in terms of SNMP transactions is simpler. The request message is very short and just specifies a piece of information that the MIDCOM client wants to retrieve. Since monitoring is a stronghold of SNMP, there are sufficient means to realize MIDCOM monitoring transactions simpler than MIDCOM configuration transactions. +--------------+ request +------------+ | |-------------->| | | | message | | | MIDCOM client| | middlebox | | | reply | | | |<--------------| | +--------------+ message +------------+ MIDCOM monitoring transaction +--------------+ +------------+ | | SNMP get | | | |-------------->| | | | message | | | | | | | | SNMP get | | | |<--------------| | | | reply message | | | SNMP manager | | SNMP agent | | | SNMP get | | | |- - - - - - - >| | | | message | | | | | | | | SNMP get | | | |< - - - - - - -| | | | reply message | | | | | | | | . . . | | +--------------+ +------------+ Implementation of MIDCOM monitoring transaction by one or more SNMP get messages Figure 4: MIDCOM monitoring transaction mapped to SNMP get transactions Quittek, Stiemerling, Srisuresh [Page 9] Internet-Draft MIDCOM MIB January 2004 All MIDCOM monitoring transactions can be realized as a sequence of SNMP get transactions. If one or more SNMP get transactions are required depends on the amount of information that is to be retrieved. 4.2.4. Atomicity of Transactions Given the realizations of MIDCOM transactions by means of SNMP transactions, atomicity of the MIDCOM transactions is not fully guaranteed anymore. However, atomicity provided by the MIB module specified in section 6 is still sufficient for meeting the MIDCOM requirements specified in [RFC3304]. We show this by analyzing atomicity for all MIDCOM transactions. 4.2.4.1. Asynchronous Transactions There are two asynchronous MIDCOM transactions: Asynchronous Session Termination (AST) and Asynchronous policy Rule Event (ARE). For both atomicity is maintained, because each of them is modeled by a single atomic SNMP notification transaction. 4.2.4.2. Session Establishment and Termination Transactions For the Session Establishment (SE) transaction and the Session Termination (ST) atomicity is maintained. The ST transaction has very few parameters. The request parameters can be transmitted by a single SNMP set request message and the reply parameters can be transmitted by a single SNMP notifications message. Basically, the same holds for SE, but it needs more explanations. The SE transaction include the optional transmission of authentication challenges and authentication replies. These are not required if SNMPv3 is used, because SNMPv3 provides all required means for authentication. Also, the SE transaction includes tranmission of middlebox capabilities from the middlebox to the MIDCOM client. But for this transmission, there is no atomicity requirement, because these capabilities are static and can be transmitted piece by piece. Therefore, the SE transaction is implemented by an SNMP set transaction modeling the request message and an SNMP notification transaction modeling the reply message excluding the transfer of middlebox capabilities. In the MIDCOM MIB module the middlebox capabilities are provided by a set of managed objects that can be read by the MIDCOM client at any time using SNMP get transactions. Quittek, Stiemerling, Srisuresh [Page 10] Internet-Draft MIDCOM MIB January 2004 4.2.4.3. Monitoring Transactions For the monitoring transactions Policy Rule List (PRL), Policy Rule Status (PRS) Group List (GL) und Group Status (GS) atomicity is not given anymore, because they are implemented by potentially more than one SNMP get operations. The problem that might occur is that while the monitoring transaction is performed, the monitored items may change. For example, while reading a long list of policies, new policies may be added and already read policies may be deleted. This is not in line with the protcol semantics. However, it is not in direct conflict with the MIDCOM requirement requesting the middlebox state to be stable and known by the MIDCOM client, because the middlebox notifies the MIDCOM client on all changes to its state that are performed during the monitoring transaction by sending notifications. If the MIDCOM client receives such a notification while performing a monitoring transaction (or shortly after completing it), the MIDCOM client can then either repeat the monitoring transaction or integrate the result of the monitoring transaction with the information received via notifications during the transaction. In both cases, the MIDCOM client will finally know the state of the middlebox. 4.2.4.4. Lifetime Change Transactions For the policy Rule Lifetime Change (RLC) transaction and the Group Lifetime Change (GLC) transaction atomicity is maintained. They both have very few parameters for request message and reply message. The request parameters can be transmitted by a single SNMP set request message and the reply parameters can be transmitted by a single SNMP notifications message. 4.2.4.5. Transactions Establishing New Policy Rules Analogous to the monitoring transactions, the atomiticty is not given for Policy Reserve Rule (PRR) and Policy Enable Rule (PER) transactions. Both transactions are potentially implemented using more than one SNMP set and get operations for obtaining transaction reply parameters. The solution for this loss of atomicity is the same as for the monitoring transactions. There is an additional atomicity problem for PRR and PER. If transferring request parameters requires more than a single set operation, then there is the potential problem that multiple MIDCOM clients sharing the same permissions are able to access the same policy rule. In this case a client could alter request parameters already set by another client before the other client could complete the request. However, this is acceptable since usually only one agent is creating a policy rule and filling it subsequently. It can Quittek, Stiemerling, Srisuresh [Page 11] Internet-Draft MIDCOM MIB January 2004 also be assumed that in most cases where clients share permissions, they act in a more or less co-ordinated way avoiding such interferences. 4.2.5. Access Control Since SNMP does not offer per-session authentication and authorization, authentication and authorization are performed per SNMP message sent from the MIDCOM client to the middlebox. For each transaction, the MIDCOM client has to authenticate itself as an SNMP user according to USM. Then the user's access rights to all resources affected by the transaction are checked. Access right control is realized by configuring the VACM mechanisms at the SNMP agent. 4.3. Access Control Policies Potentially, a middlebox has to control access for a large set of MIDCOM clients and to a large set of policy rules configuring firewall pinholes and NAT bindings. Therefore it can be beneficial to use access control policies for specifying access control rules. Generating, provisioning and managing these policies is out of scope of this MIB module. However, if such access control policy system is used, then the SNMP agent acts as policy enforcement point. An access control policy system must transform all active policies into configurations of the SNMP agent's User Based Security Model (USM) and the View-based Access Control Model (VACM). The mechanisms of USM allow an access control policy system to enforce MIDCOM client authentication rules and general access control of MIDCOM clients to middlebox control. The mechanisms of VACM can be used to enforce access control of authenticated clients to MIDCOM policy rules based on the concept of ownership. For example, an access control policy can specify that MIDCOM policy rules owned by user A, cannot be accessed at all by user B, can be read by user C, and can be read and modified by user D. Further access control policies can control access to concrete middlebox resources. These are enforces, when a MIDCOM request is processed. For example an authenticated MIDCOM client may be authorized to request new MIDCOM policies to be established, but only for certain IP address ranges. The enforcement of this kind of policies cannot be realized by using available SNMP mechanisms, but needs to be performed by the individual MIB module implementation. Quittek, Stiemerling, Srisuresh [Page 12] Internet-Draft MIDCOM MIB January 2004 5. Structure of the MIB module the MIB module defined in Section 6 contains three branches of managed objects: - Signaling objects The signaling branch contains objects that are required for implementing the MIDCOM protocol requirements defined in [RFC3304] and the MIDCOM protocol semantics defined in [RFCXXXX]. - Configuration objects Configuration objects can be used for retrieving middlebox capability information (mandatory) and for setting parameters of the implementation of objects in the signaling branch (optional). - Monitoring objects The optional monitoring objects that provide information about used resource and about MIDCOM signaling statistics. 5.1. Signaling Objects The signaling branch is structured according to the MIDCOM semantics described in [RFCXXXX]. It contains three groups of objects for session control, policy rule control and policy rule group control. 5.1.1. midcomSession The midcomSession group of managed objects models MIDCOM sessions. For opening a session, a MIDCOM client has to create a row in the contained midcomSessionTable. The scalar object midcomSessionIndexNext provides free indices to be used for creating entries in the midcomSessionTable. Without an entry in the midcomSessionTable, no policy rules can be established. The first index element, midcomSessionOwner, of the midcomSessionTable SHOULD uniquely identify an authenticated MIDCOM client. It is of type SnmpAdminString, a textual convention that allows for use of the SNMPv3 View-Based Access Control Model (RFC 3415 [RFC3415], VACM) and allows a management application to identify its entries. The second index element, midcomSessionIndex, enables the same management application to have multiple open sessions. The midcomSessionTable contains the following objects: o midcomSessionOwner This string indicated the user that created and owns the session. It is the firswt index element of this table. All policy rules (and policy rule groups) have the same owner as the Quittek, Stiemerling, Srisuresh [Page 13] Internet-Draft MIDCOM MIB January 2004 corresponding entry in the midcomSessionTable from which they were created. o midcomSessionIndex The second index element serves for distiguishing different sessions of the same midcomSessionOwner. o midcomSessionRuleGroupIndex The group for which a free index in the policyRuleTable is obtained by reading object midcomSessionRuleNewIndex. This object must be set properly before reading a free index from midcomSessionRuleIndexNext. o midcomSessionRuleIndexNext This object returns a part of an index that is so far unused in the midcomRuleTable. The full unused index is given by the combination of values of the objects midcomSessionOwner and midcomSessionRuleGroupIndex of the same row of the midcomSessionTable in combination with the returned value. o midcomSessionStorageType This object indicates whether or not the session is stored in volatile or non-volatile memory. Depending on the MIDCOM MIB implementation this object may be writable. o midcomSessionRowStatus Writing to this object creates or deletes an entry in the midcomSessionTable, i.e. it opens or terminates a session, respectively. 5.1.2. midcomRuleTable The midcomRuleTable contains information about policy rules including policy rules to be established, policy rules for which establishing failed, established policy rules and terminated policy rules. Entries in this table are indexed by the combination of midcomSessionOwner, midcomGroupIndex and midcomRuleIndex. The midcomSessionOwner is the owner of the session from which the entry was created, the midcomGroupIndex is the index of the group of which the policy rule is a member. midcomSessionOwner is of type SnmpAdminString, a textual convention that allows for use of the SNMPv3 View-Based Access Control Model (RFC 3415 [RFC3415], VACM) and allows a management application to identify its entries. The second index element, midcomSessionIndex, enables the same management application to have multiple open sessions. Entries in this table can only be created after a valid value for the midcomRuleIndex has been read from midcomSessionRuleIndexNext in the corresponding entry of the midcomSessionTable. Entries are removed, Quittek, Stiemerling, Srisuresh [Page 14] Internet-Draft MIDCOM MIB January 2004 when both, their midcomRuleLifetime and midcomRuleStorageTime, are timed out by counting down to 0. A MIDCOM client can explicitly remove an entry by setting midcomRuleLifetime and midcomRuleStorageTime to 0. The table contains the following columnar objects: o midcomRuleIndex The index of this entry must be unique in combination with the midcomSessionOwner and the midcomGroupIndex of the entry. o midcomRuleAdminStatus For establishing a new policy rule, a set of objects in this entry needs to be written first. These objects are the request parameters. Then, by writing either reserve(1) or enable(2) to this object, the MIDCOM MIB implementation is triggered to start processing the parameters and will tries to establish the specified policy rule. o midcomRuleOperStatus This read-only object indicates the current status of the entry. The entry may have an initializing state, it may have a transient state while processing requests, it may have an error state after a request was rejected, it may have a state where a policy rule is established, or it may have a terminated state. o midcomRuleStorageType This object indicates whether or not the policy rule is stored as volatile, non-volatile, or permanent. Depending on the MIDCOM MIB implementation this object may be writable. o midcomRuleStorageTime This object indicates how long the entry will still exist after entering an error state or a termiantion state. o midcomRuleError This object is a string indicating the reason for entering an error state. o midcomRuleNatService This object indicates which kind of NAT service is requested or established, respectively. Possible NAT services are traditional NAT and twice-NAT. o midcomRuleNatInterface This object indicates an IP interface at which NAT service is requested or performed, respectively. o midcomRuleFlowDirection This object indicates a flow direction for which a policy enable Quittek, Stiemerling, Srisuresh [Page 15] Internet-Draft MIDCOM MIB January 2004 rule was requested or established, respectively. o midcomRuleMaxIdleTime This object indicates the maximum idle time of the policy rule in seconds. If no packet to which the policy rule applies passes the middlebox for the time specified by midcomRuleMaxIdleTime, then the policy rule enters a termination state. o midcomRuleTransportProtocol This object indicates a transport protocol for which a policy reserve rule or policy enable rule was requested or established, respectively. o midcomRulePortRange This object indicates a port ramnge for which a policy reserve rule or policy enable rule was requested or established, respectively. o midcomRuleLifetime This object indicates the remaining lifetime of an established policy rule. The MIDCOM client can change the remaining lifetime by writing to it. o midcomRuleRowStatus This object allows entries to be added to the table. Beyond the listed objects, the table contains 10 further objects describing address parameters. They include the IP version, IP address, prefix length and port number for the internal address (A0), inside address (A1), outside address (A2) and external address (A3). These objects serve as parameters specifying a request or an established policy, respectively. A0, A1, A2 and A3 are address tuples defined according to the MIDCOM semantics [RFCXXXX]. Each of them identifies either a communication endpoint at an internal or external device or an allocated address at the middlebox. +----------+ +----------+ | internal | A0 A1 +-----------+ A2 A3 | external | | endpoint +----------+ middlebox +----------+ endpoint | +----------+ +-----------+ +----------+ Figure 5: Addess tuples A0 - A3 - A0 - internal endpoint: address tuple A0 specifies a communication endpoint of a devices within the - with respect to Quittek, Stiemerling, Srisuresh [Page 16] Internet-Draft MIDCOM MIB January 2004 the middlebox - internal network. - A1 - middlebox inside address: address tuple A1 specifies a virtual communication endpoint at the middlebox within the internal network. A1 is the destination address for packets passing from the internal endpoint to the middlebox, and is the source for packets passing from the middlebox to the internal endpoint. - A2 - middlebox outside address: address tuple A2 specifies a virtual communication endpoint at the middlebox within the external network. A2 is the destination address for packets passing from the external endpoint to the middlebox, and is the source for packets passing from the middlebox to the external endpoint. - A3 - external endpoint: address tuple A3 specifies a communication endpoint of a devices within the - with respect to the middlebox - external network. 5.1.3. midcomGroupTable The midcomGroupTable has an entry per existing polcy rule group. Entries of this table are created automatically when creating member entries in the midcomRuleTable. Entries are automatically removed from this table, when the last member entry is removed from the midcomRuleTable. Entries cannot be created or removed explicitly by the MIDCOM client. Entries are indexed by the midcomSessionOwner of the session from which the policies belonging to the group where created and they are indexed by a specific midcomGroupIndex. An entry of the table contains the following objects: o midcomGroupIndex The index of this entry must be unique in combination with the midcomSessionOwner of the entry. o midcomGroupLifetime This object indicates the maximum of the remaining lifetimes of all established policy rules that are members of the group. The MIDCOM client can change the remaining lifetime of all member policies by writing to this object. 5.2. Configuration Objects The configuration branch contains middlebox capability and configuration information. Some of the contained objects are (optionally) writable and can also be used for configuring the Quittek, Stiemerling, Srisuresh [Page 17] Internet-Draft MIDCOM MIB January 2004 middlebox service. The capabilities group contains some general capability information and detailed information per supported IP interface. The midcomConfigFirewallTable can be used to configure how the MIDCOM MIB implementation creates rules in used firewall implementations. Note that typically, objects in the configuration branch are not intended to be written by MIDCOM clients. In general, write access to these objects needs to be restricted more strictly than write access to objects in the signaling branch. 5.2.1. Capabilities Information on middlebox capabilites, i.e. capabilities of the MIDCOM MIB implementation, is provided by the midcomCapabilities group of managed objects. The following objects are defined: o midcomConfigMaxLifetime This object indicates the maximum lifetime that this middlebox allows policy rules to have. o midcomConfigPersistentRules This is a boolean object indicating whether or not the middlebox is capable of storing policy rules persistently. Further capabilities are provided by the midcomConfigIfTable per IP interface. This table contains just two objects. The first one is a BITS object called midcomConfigIfBits containing the following bit values: o ipv4 and ipv6 These two bit values provide information on which IP versions are supported by the middlebox at the indexed interface. o addressWildcards and portWildcards These two bit values provide information on wildcarding supported by the middlebox at the indexed interface. o firewall and nat These two bit values provide information on availability of firewall and NAT functionality at the indexed interface. o portTranslation, protocolTranslation, and twiceNat These three bit values provide information on the kind of NAT functionality available at the indexed interface. o inside This bit indicates whether or not the indexed interface is an inside interface with respect to NAT functionality. Quittek, Stiemerling, Srisuresh [Page 18] Internet-Draft MIDCOM MIB January 2004 The second object indicates whether or not the middlebox capabilities described by midcomConfigIfBits are available or not available at the indexed IP interface. The midcomConfigIfTable uses index 0 for indicating capabilities that are available for all interfaces. 5.2.2. midcomConfigFirewallTable The midcomConfigFirewallTable serves for configuring how policy rules created by MIDCOM clients are realized as firewall rules of a firewall implementation. Particularly, the priority used for MIDCOM policy rules can be configured. For a single firewall implementation at a particular IP interface, all MIDCOM policy rules are realized as firewall rules with the same priority. Also a firewall rule group name can be configured. The table is indexed by the IP interface index. An entry of the table contains the following objects: o midcomConfigFirewallGroupId The firewall rule group to which all firewall rules of the MIDCOM server are assigned. o midcomConfigFirewallPriority The priority assigned to all firewall rules of the MIDCOM server. 5.3. Monitoring Objects The monitoring branch contains two groups of objects: the resource group and the statistics group. The resource group provides information about which resources are used by which policy rule. The statistics group provide statistics about the usage of objects in the signaling branch. 5.3.1. midcomResourceTable Information about resource usage per policy rule is provided by the midcomResourceTable. Each entry in the midcomResourceTable describes resource usage of exactly one policy rule. Resources are NAT resources and firewall resources, depending on the type of middlebox. Used NAT resources include NAT bindings and NAT sessions. NAT address mappings are not covered. For firewalls, firewall filter rules are considered as resources. The values provide by the following objects on NAT binds and NAT sessions may refer to the detailed resource usage description in the NAT-MIB module [RFCXXYY]. Quittek, Stiemerling, Srisuresh [Page 19] Internet-Draft MIDCOM MIB January 2004 The values provided by the following objects on firewall rules may refer to more detailed firewall resource usage descriptions in other MIB modules. An entry of the table contains the following objects: o midcomRscNatInternalAddrBindMode This object indicates whether the binding of the internal address is an address NAT binding or an address-port NAT binding. o midcomRscNatInternalAddrBindId This object identifies the NAT binding for the internal address in the NAT engine. o midcomRscNatExternalAddrBindMode This object indicates whether the binding of the external address is an address NAT binding or an address-port NAT binding. o midcomRscNatExternalAddrBindId This object identifies the NAT binding for the external address in the NAT engine. o midcomRscNatSessionId1 This object links to the first NAT session associated with one of the above NAT bindings. o midcomRscNatSessionId2 This object links to the optional second NAT session associated with one of the above NAT bindings. o midcomRscFirewallRuleId The firewall rule for this policy rule. 5.3.2. midcomStatistics The statistics group contains a set of non-columnar objects that provide 'MIDCOM protocol statistics' i.e. statistics about the usage of objects in the signaling branch. o midcomSessionsRejected MIDCOM agents are required to establish a session prior to any further access to policy rules or groups. This object counts the rejected session establishment requests. o midcomSessionsCurrent This object indicates the total number of current established sessions. Quittek, Stiemerling, Srisuresh [Page 20] Internet-Draft MIDCOM MIB January 2004 o midcomSessionsTotal This object indicates the total number of established sessions current and in the past. o midcomRuleEntriesRejected This object indicates the total number of failed attempts to create an entry in the midcomRuleTable. o midcomRulesIncomplete This object indicates the total number of policy rules that have not been fully loaded into a table row of midcomRuleTable. o midcomReserveRulesIncorrect This object indicates the total number of policy reserve rules that were rejected because the request was incorrect. o midcomReserveRulesRejected This object indicates the total number of policy reserve rules that were failed while being processed. o midcomReserveRulesActive This object indicates the number of currently active policy reserve rules in the midcomRuleTable. o midcomReserveRulesExpired This object indicates the total number of expired policy reserve rules. o midcomReserveRulesTerminatedOnRq This object indicates the total number of policy reserve rules that were terminated on request. o midcomReserveRulesTerminated This object indicates the total number of policy reserve rules that were terminated, but not on request. o midcomEnableRulesIncorrect This object indicates the total number of policy enable rules that were rejected because the request was incorrect. o midcomEnableRulesRejected This object indicates the total number of policy enable rules that were failed while being processed. o midcomEnableRulesActive This object indicates the number of currently active policy enable rules in the midcomRuleTable. o midcomEnableRulesExpired This object indicates the total number of expired policy enable Quittek, Stiemerling, Srisuresh [Page 21] Internet-Draft MIDCOM MIB January 2004 rules. o midcomEnableRulesTerminatedOnRq This object indicates the total number of policy enable rules that were terminated on request. o midcomEnableRulesTerminated This object indicates the total number of policy enable rules that were terminated, but not on request. o midcomTransactionsRejected This object indicates the total number of rejected transactions. For example, a transaction is rejected when there is no session established for the requesting SNMP manager, i.e. no entry in midcomSessionTable. o midcomTransactionsFailed This object indicates the total number of failed transactions. These transactions were accepted (not rejected), but due to some reason they failed. For instance a transaction consisting of multiple SET operations is only performed with a single SET. o midcomTransactionsCompleted This object indicates the total number of successfully completed transactions at the MIDCOM server. 5.4. Notifications For informing MIDCOM clients about state changes of MIDCOM-MIB implementations, three notifications can be used: o midcomSessionTermination This notification can be generated for indicating that a session is terminated by the middlebox. o midcomRuleEvent This notification can be generated for indicating the change of a policy rule's state or lifetime. o midcomGroupEvent This notification can be generated for indicating the change of a policy rule group's lifetime. 6. Usage Examples This section presents some examples that explain how a MIDCOM client acting as SNMP manager can use the MIDCOM MIB defined in this memo. The purpose of these examples is to explain the steps that are required to perform MIDCOM transactions. For each MIDCOM transaction Quittek, Stiemerling, Srisuresh [Page 22] Internet-Draft MIDCOM MIB January 2004 defined in the MIDCOM semantics in [RFCXXXX], a sequence of SNMP operations is described, which realizes the transaction. We consider three different ways, a MIDCOM client can choose to operate on the MIDCOM MIB. The first one is in line with the MIDCOM semantics. It models MIDCOM transactions as described in section 4.2 using SNMP notifications for signaling completion of processing a transaction from the MIDCOM MIB implementation to the MIDCOM client. The second way uses notifications in configuration transactions only in 'unexpected' cases, when a request failes. The third one does not use notifications at all in configuration transaction. We describe the realization of MIDCOM transactions just for the first way of operating on the MIDCOM MIB. For the other two ways, no examples are given, but such can be easily constructed from the examples for the first way. 6.1. Session Establishment (SE) This example explains the steps performed by an SNMP manager to establish a MIDCOM session. 1. The MIDCOM client first checks the middlebox capabilities by reading objects in the midcomCapabilitiesGroup. 2. The MIDCOM client reads the midcomSessionNextIndex object in order to receive an index for creating a session. 3. The manager creates a row in the midcomSessionTable by issuing an SNMP set-request. The midcomSessionRowStatus object is set to createAndWait(5). The new row is indexed by the MIDCOM client's USM user name and by the index read from the midcomSessionNextIndex object in step 2. 4. If the MIDCOM client wants to have all policy rules it creates to be member of the same particular policy rule group, then the MIDCOM client should set the midcomSessionRuleGroupIndex to the group index that is to be used. 6.2. Session Termination (ST) This example explains the steps performed by an SNMP manager to terminate a MIDCOM session. 1. The manager sends an SNMP set-request to change the midcomSessionRowStatus object to destroy(6). This will remove the row from the midcomSessionTable but not have an effect on entries in the midcomRuleTable created from this session. Quittek, Stiemerling, Srisuresh [Page 23] Internet-Draft MIDCOM MIB January 2004 6.3. Asynchronous Session Termination (AST) At any time, the MIDCOM MIB implementation may terminate a session. Only two steps are required for performing this transaction. 1. The MIDCOM MIB implementation sends a midcomSessionTermination notification to the SNMP manager owning the session. 2. The MIDCOM MIB implementation removes the corresponding row of the midcomSessionTable. This does not affect entries in other tables. 6.4. Policy Reserve Rule (PRR) This example explains the steps performed by an SNMP manager to establish a policy reserve rule. 1. If the new policy rule should become a member of a particular (existing or not existing) policy rule group, then the SNMP manager sets the midcomSessionGroupIndex object to the index of that group. 2. The SNMP manager reads the midcomSessionRuleNewIndex from an open entry in the modcomSessionTable in order to trigger creation of a new entry in the midcomRuleTable. The new entry in the midcomRuleTable has the following index elements: midcomSessionOwner has the same value as the session from which the value of midcomSessionRuleNewIndex was read; midcomGroupIndex has the value of midcomSessionRuleGroupIndex at the time the value of midcomSessionRuleNewIndex was read; and midcomRuleIndex has the value read from midcomSessionRuleNextIndex. 3. The SNMP manager sets the following objects in the new entry of the midcomRuleTable to specify all request parameters of the PRR transaction: - midcomRuleNatService - midcomRuleNatInterface - midcomRuleTransportProtocol - midcomRulePortRange - midcomRuleInternalIpVersion - midcomRuleExternalIpVersion - midcomRuleInternalIpAddr - midcomRuleInternalIpPrefixLength - midcomRuleInternalPort - midcomRuleLifetime Note, that several of these parameters have default values that can be used. 4. The SNMP manager sets the midcomRuleAdminStatus objects in the new row of the midcomRuleTable to reserve(1). Quittek, Stiemerling, Srisuresh [Page 24] Internet-Draft MIDCOM MIB January 2004 5. The SNMP manager waits for a midcomRuleEvent notification concerning the new policy rule in the midcomSessionTable. 6. After receiving the midcomRuleEvent notification SNMP manager checks the lifetime value carried by the notification. If it is greater than 0, the SNMP manager read all positive reply parameters of the PRR transaction: - midcomRuleOutsideIpAddr - midcomRuleOutsidePort - midcomRuleLifetime If the lifetime equals 0, then SNMP manager reads the midcomRuleOperStatus and the midcomRuleError in order to analyze the failure reason. 6.5. Policy Enable Rule (PER) after PRR This example explains the steps performed by an SNMP manager to establish a policy enable rule after a corresponding policy reserve rule was already established. 1. The SNMP manager sets the following objects in the row of the established PRR in the midcomRuleTable to specify all request parameters of the PER transaction: - midcomRuleMaxIdleTime - midcomRuleExternalIpAddr - midcomRuleExternalIpPrefixLength - midcomRuleExternalPort - midcomRuleFlowDirection Note, that several of these parameters have default values that can be used. 2. The SNMP manager sets the midcomRuleAdminStatus objects in the row of the established PRR in the midcomRuleTable to enable(1). 3. The SNMP manager waits for a midcomRuleEvent notification concerning the new row in the midcomSessionTable. 4. After receiving the midcomRuleEvent notification SNMP manager checks the lifetime value carried by the notification. If it is greater than 0, the SNMP manager read all positive reply parameters of the PER transaction: - midcomRuleInsideIpAddr - midcomRuleInsidePort - midcomRuleLifetime If the lifetime equals 0, then SNMP manager reads the midcomRuleOperStatus and the midcomRuleError in order to analyze the failure reason. Quittek, Stiemerling, Srisuresh [Page 25] Internet-Draft MIDCOM MIB January 2004 6.6. Policy Enable Rule (PER) without previous PRR This example explains the steps performed by an SNMP manager to establish a policy enable rule for which no PRR transaction has been performed before. 1. Identical to step 1 for PRR. 2. Identical to step 2 for PRR. 3. The SNMP manager sets the following objects in the new row of the midcomRuleTable to specify all request parameters of the PER transaction: - midcomRuleNatService - midcomRuleNatInterface - midcomRuleFlowDirection - midcomRuleMaxIdleTime - midcomRuleTransportProtocol - midcomRulePortRange - midcomRuleInternalIpVersion - midcomRuleExternalIpVersion - midcomRuleInternalIpAddr - midcomRuleInternalIpPrefixLength - midcomRuleInternalPort - midcomRuleExternalIpAddr - midcomRuleExternalIpPrefixLength - midcomRuleExternalPort - midcomRuleLifetime Note, that several of these parameters have default values that can be used. 4. The SNMP manager sets the midcomRuleAdminStatus objects in the new row of the midcomRuleTable to enable(1). 5. Identical to step 6 for PRR. 6. After receiving the midcomRuleEvent notification SNMP manager checks the lifetime value carried by the notification. If it is greater than 0, the SNMP manager read all positive reply parameters of the PRR transaction: - midcomRuleInsideIpAddr - midcomRuleInsidePort - midcomRuleOutsideIpAddr - midcomRuleOutsidePort - midcomRuleLifetime If the lifetime equals 0, then SNMP manager reads the midcomRuleOperStatus and the midcomRuleError in order to analyze the failure reason. Quittek, Stiemerling, Srisuresh [Page 26] Internet-Draft MIDCOM MIB January 2004 6.7. Policy Rule Lifetime Change (RLC) This example explains the steps performed by an SNMP manager to change the lifetime of a policy rule. Changing the lifetime to 0 implies terminating the policy rule. 1. The SNMP manager issues a set-request for writing the desired lifetime to the midcomRuleLifetime object in the corresponding row of the midcomRuleTable. 2. The SNMP manager waits for a midcomRuleEvent notification concerning the corresponding row in the midcomRuleTable. 3. After receiving the midcomRuleEvent notification SNMP manager checks the lifetime value carried by the notification. 6.8. Policy Rule List (PRL) The SNMP agent can browse the list of policy rules by browsing the midcomRuleTable. For each observed row in this table, the SNMP agent should check the midcomRuleOperStatus in order to find out, if the row contains information about an established policy rule or of a rule that is under construction or already terminated. 6.9. Policy Rule Status (PRS) The SNMP agent can retrieve all status information and properties of a policy rule by reading the managed objects in the corresponding row of the midcomRuleTable. 6.10. Asynchronous Policy Rule Event (ARE) At any time, the MIDCOM MIB implementation may terminate a policy rule. in this case two steps are required for performing this transaction: 1. The MIDCOM MIB implementation sends a midcomRuleEvent notification containing a lifetime value of 0 to the SNMP manager owning the session. 2. If the midcomRuleStorageTime object in the corresponding row of the midcomRuleTable has a value of 0 then the MIDCOM MIB implementation removes the row from the table. Otherwise, it changes in this row the midcomRuleLifetime object to 0 and the midcomRuleOperStatus object to terminated(11). The procedure is the same if the lifetime of a policy rule expires. The only difference is that then the midcomRuleOperStatus object is set to timedOut(9) instead of terminated(11). Quittek, Stiemerling, Srisuresh [Page 27] Internet-Draft MIDCOM MIB January 2004 6.11. Group Lifetime Change (GLC) This example explains the steps performed by an SNMP manager to change the lifetime of a policy rule group. Changing the lifetime to 0 implies terminating all member policies of the group. 1. The SNMP manager issues a set-request for writing the desired lifetime to the midcomGroupLifetime object in the corresponding row of the midcomGroupTable. 2. The SNMP manager waits for a midcomGroupEvent notification concerning the corresponding row in the midcomGroupTable. 3. After receiving the midcomRuleEvent notification SNMP manager checks the lifetime value carried by the notification. 6.12. Group List (GL) The SNMP agent can browse the list of policy rule groups by browsing the midcomGroupTable. For each observed row in this table, the SNMP agent should check the midcomGroupLifetime in order to find out, if the group does contain established policies. 6.13. Group Status (GS) The SNMP agent can retrieve all member policies of a group by browsing the midcomRuleTable using the midcomGroupIndex of the particular group. For retrieving the remaining lifetime of the group, the SNMP agent reads the midcomGroupLifetime object in the corresponding row of the midcomGroupTable. 7. Definitions MIDCOM-MIB DEFINITIONS ::= BEGIN IMPORTS MODULE-IDENTITY, OBJECT-TYPE, NOTIFICATION-TYPE, Unsigned32, mib-2 FROM SNMPv2-SMI -- RFC2578 TEXTUAL-CONVENTION, TruthValue, StorageType, RowStatus FROM SNMPv2-TC -- RFC2579 MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF -- RFC2580 SnmpAdminString FROM SNMP-FRAMEWORK-MIB -- RFC3411 Quittek, Stiemerling, Srisuresh [Page 28] Internet-Draft MIDCOM MIB January 2004 InetAddressType, InetAddress, InetPortNumber FROM INET-ADDRESS-MIB -- RFC 3291 ifIndex FROM IF-MIB -- RFC2863 NatBindIdOrZero FROM NAT-MIB; -- RFCXXXX -- currently from draft-ietf-nat-natmib-08.txt midcomMIB MODULE-IDENTITY LAST-UPDATED "200401301111Z" -- January, 30, 2004 ORGANIZATION "IETF Middlebox Communication Working Group" CONTACT-INFO "WG charter: http://www.ietf.org/html.charters/midcom-charter.html Mailing Lists: General Discussion: midcom@ietf.org To Subscribe: midcom-request@ietf.org In Body: subscribe your_email_address Editor: Juergen Quittek NEC Europe Ltd. Network Laboratories Kurfuersten-Anlage 36 69115 Heidelberg Germany Tel: +49 6221 90511-15 Email: quittek@ccrle.nec.de" DESCRIPTION "This MIB module defines a set of basic objects for configuring middleboxes, such as firewalls and network address translators, in order to enable communication across these devices. Managed objects defined in this MIB module are structured in three branches: - signaling objects required according to the MIDCOM protocol requirements defined in RFC 3304 and according to the MIDCOM protocol semantics defined in RFC XXXX, - optional configuration objects that can be used for setting parameters of the implementation of objects in the signaling branch, - optional monitoring objects that provide information about used resource and statistics In the signaling objects branch there are four groups of Quittek, Stiemerling, Srisuresh [Page 29] Internet-Draft MIDCOM MIB January 2004 managed objects defined: - objects describing middlebox capabilities in the midcomCapabilities group, - objects modeling MIDCOM sessions in the midcomSessionTable - objects modeling MIDCOM policy rules in the midcomRuleTable - objects modeling MIDCOM policy rule groups in the midcomGroupTable Note that typically, objects in the configuration branch are not intended to be used by MIDCOM clients. In general, access to these objects needs to be restricted more strictly than access to objects in the signaling branch. Copyright (C) The Internet Society (2004). This version of this MIB module is part of RFC yyyy; see the RFC itself for full legal notices." -- RFC Ed.: replace yyyy with actual RFC number & remove this notice REVISION "200401301111Z" -- January, 30, 2004 DESCRIPTION "Initial version, published as RFC yyyy." -- RFC Ed.: replace yyyy with actual RFC number & remove this notice ::= { mib-2 44444 } -- 44444 to be assigned by IANA. -- -- main components of this MIB module -- midcomObjects OBJECT IDENTIFIER ::= { midcomMIB 1 } midcomNotifications OBJECT IDENTIFIER ::= { midcomMIB 2 } midcomConformance OBJECT IDENTIFIER ::= { midcomMIB 3 } -- Signaling objects required according to the MIDCOM -- protocol requirements defined in RFC 3304 and according to -- the MIDCOM protocol semantics defined in RFC XXXX midcomSignaling OBJECT IDENTIFIER ::= { midcomObjects 1 } -- Configuration objects that can be used for retrieving -- middlebox capability information (mandatory) and for -- setting parameters of the implementation of objects in -- the signaling branch (optional) midcomConfig OBJECT IDENTIFIER ::= { midcomObjects 2 } -- Optional monitoring objects that provide information about -- used resource and statistics midcomMonitoring OBJECT IDENTIFIER ::= { midcomObjects 3 } Quittek, Stiemerling, Srisuresh [Page 30] Internet-Draft MIDCOM MIB January 2004 -- -- Signaling Objects -- -- Signaling objects are structured according to the MIDCOM -- protocol semantics into three groups: -- - the session group containing objects that model MIDCOM -- sessions, -- - the policy rules group containing objects that model -- policy rules, and -- - the group group containing objects modeling policy rule -- groups. -- -- Session group -- -- The midcomSessionTable models MIDCOM sessions. -- MIDCOM clients ( = SNMP managers ) that want to -- read, create or modify entries in the midcomRuleTable -- or midcomGroupTable need to have an entry in this table. -- -- The table contains objects identify a destination for -- notifications to be sent to the MIDCOM client. -- Also it serves for creating new rows in the -- midcomRuleTable. -- midcomSessionIndexNext OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "When retrieved, this object returns an unused session index for the SNMP manager that issued the read-request. The returned value can be used for creating a new entry in the midcomSessionTable. A value returned when reading this object is not returned again on subsequent read-requests as long as possible. This ensures that two instances of SNMP managers authenticated as the same manager can independently create sessions without facing race conditions. A MIDCOM MIB implementation SHOULD reject set requests that try to create a row in the midcomSessionTable with an index that was not returned in response to a previous get request for midcomSessionIndexNext." ::= { midcomSignaling 1 } midcomSessionTable OBJECT-TYPE Quittek, Stiemerling, Srisuresh [Page 31] Internet-Draft MIDCOM MIB January 2004 SYNTAX SEQUENCE OF MidcomSessionEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "This table lists open MIDCOM sessions. The midcomSessionTable models MIDCOM sessions. MIDCOM clients ( = SNMP managers ) that want to read, create or modify entries in the midcomRuleTable or midcomGroupTable need to have an entry in this table. Only SNMP managers for which an entry in this table exists, will receive SNMP notifications concerning policy rule events or policy rule group events. A manager can create a new policy rule of the midcomRuleTable by reading midcomSessionRuleNewIndex in this table. The midcomSessionTable is indexed by its owner identified as SNMP manager, and by a session index that allows distinguishing multiple sessions of the same manager. midcomSessionOwner SHOULD uniquely identify an authenticated MIDCOM client. It is of type SnmpAdminString, a textual convention that allows for use of the SNMPv3 View-Based Access Control Model (RFC 3415, VACM) and allows an management application to identify its entries." ::= { midcomSignaling 2 } midcomSessionEntry OBJECT-TYPE SYNTAX MidcomSessionEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "An entry describing a particular MIDCOM session." INDEX { midcomSessionOwner, midcomSessionIndex } ::= { midcomSessionTable 1 } MidcomSessionEntry ::= SEQUENCE { midcomSessionOwner SnmpAdminString, midcomSessionIndex Unsigned32, midcomSessionRuleGroupIndex Unsigned32, midcomSessionRuleNewIndex Unsigned32, midcomSessionStorageType StorageType, midcomSessionRowStatus RowStatus } Quittek, Stiemerling, Srisuresh [Page 32] Internet-Draft MIDCOM MIB January 2004 midcomSessionOwner OBJECT-TYPE SYNTAX SnmpAdminString (SIZE (0..32)) MAX-ACCESS not-accessible STATUS current DESCRIPTION "The manager who owns this row in the midcomSessionTable. This object SHOULD uniquely identify an authenticated MIDCOM client. It is of type SnmpAdminString, a textual convention that allows for use of the SNMPv3 View-Based Access Control Model (RFC 3415, VACM) and allows an management application to identify its entries." ::= { midcomSessionEntry 1 } midcomSessionIndex OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS not-accessible STATUS current DESCRIPTION "This object allows distinguishing multiple concurrent sessions of the same SNMP manager. Its value needs to be unique per manager." ::= { midcomSessionEntry 2 } midcomSessionRuleGroupIndex OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-create STATUS current DESCRIPTION "This object indicated for which policy rule group a policy rule index is generated when object midcomSessionRuleNewIndex is read. If this object is not explicitly set at all, then all policy rules generated from this session will belong to the default group 0. Setting this object to the midcomGroupId of an existing or non-existing group will result in the next policy rule index created by reading objects midcomSessionRuleNewIndex to be generated as member of that group." DEFVAL { 0 } ::= { midcomSessionEntry 3 } midcomSessionRuleNewIndex OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "Reading this object creates a new entry in the midcomRuleTable. Entries in this table can only be Quittek, Stiemerling, Srisuresh [Page 33] Internet-Draft MIDCOM MIB January 2004 generated by reading this object. The index of the new entry of the midcomRuleTable consists of three elements. The first one is the midcomSession index of the entry at which the value of midcomSessionRuleNewIndex was read. The second index is the current value of midcomSessionRuleGroupIndex in the same entry of the midcomSessionTable. The third element is the value returned then this object is read. If a MIDCOM MIB implementation does not receive a write request for a new created entry in a certain time interval starting a the time of creation, then it MAY remove the entry. This time interval MUST have a length of at least 60 seconds. This procedure for creating entries in the midcomRuleTable ensures that entries are only generated from open sessions." ::= { midcomSessionEntry 4 } midcomSessionStorageType OBJECT-TYPE SYNTAX StorageType MAX-ACCESS read-create STATUS current DESCRIPTION "When retrieved, this object returns the storage type of the session. Writing to this object can change the storage type of the particular row from volatile(2) to nonVolatile(3) or vice versa. Attempts to set this object to permanent will always fail with an inconsistentValue error. If midcomSessionStorageType has the value permanent(4), then all objects in this row whose MAX-ACCESS value is read-create must be read-only." DEFVAL { volatile } ::= { midcomSessionEntry 5 } midcomSessionRowStatus OBJECT-TYPE SYNTAX RowStatus MAX-ACCESS read-create STATUS current DESCRIPTION "A control that allows entries to be added and removed from this table. Attempts to destroy(6) a row or to set a row notInService(2) where the value of the Quittek, Stiemerling, Srisuresh [Page 34] Internet-Draft MIDCOM MIB January 2004 midcomSessionStorageType object is permanent(4) or readOnly(5) will result in an inconsistentValue error. The value of this object has no effect on whether other objects in this conceptual row can be modified." ::= { midcomSessionEntry 6 } -- -- Policy rule group -- -- The midcomRuleTable lists policy rules -- including policy reserve rules and policy enable rules. -- midcomRuleTable OBJECT-TYPE SYNTAX SEQUENCE OF MidcomRuleEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "This table lists policy rules. It is indexed by the midcomSessionOwner, the midcomGroupIndex and the midcomRuleIndex. This implies that a rule is member of exactly one group and that group membership cannot be changed. Entries in this table can only be created by reading midcomSessionRuleNewIndex. The midcomGroupIndex can be chosen by the manager by setting midcomSessionRuleGroupIndex before reading midcomSessionRuleNewIndex. Entries are deleted by writing to midcomGroupLifetime or midcomRuleLifetime and potentially also to midcomRuleStorageTime. A MIDCOM MIB implmentation MUST ensure that managers can access this table only if they have a corresponding open session, i.e. a valid row in the midcomSessionTable." ::= { midcomSignaling 3 } midcomRuleEntry OBJECT-TYPE SYNTAX MidcomRuleEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "An entry describing a particular MIDCOM policy rule." INDEX { midcomSessionOwner, midcomGroupIndex, midcomRuleIndex } Quittek, Stiemerling, Srisuresh [Page 35] Internet-Draft MIDCOM MIB January 2004 ::= { midcomRuleTable 1 } MidcomRuleEntry ::= SEQUENCE { midcomRuleIndex Unsigned32, midcomRuleAdminStatus INTEGER, midcomRuleOperStatus INTEGER, midcomRuleStorageType StorageType, midcomRuleStorageTime Unsigned32, midcomRuleError SnmpAdminString, midcomRuleNatService INTEGER, midcomRuleNatInterface Unsigned32, midcomRuleFlowDirection INTEGER, midcomRuleMaxIdleTime Unsigned32, midcomRuleTransportProtocol Unsigned32, midcomRulePortRange INTEGER, midcomRuleInternalIpVersion InetAddressType, midcomRuleExternalIpVersion InetAddressType, midcomRuleInternalIpAddr InetAddress, midcomRuleInternalIpPrefixLength Unsigned32, midcomRuleInternalPort InetPortNumber, midcomRuleExternalIpAddr InetAddress, midcomRuleExternalIpPrefixLength Unsigned32, midcomRuleExternalPort InetPortNumber, midcomRuleInsideIpAddr InetAddress, midcomRuleInsidePort InetPortNumber, midcomRuleOutsideIpAddr InetAddress, midcomRuleOutsidePort InetPortNumber, midcomRuleLifetime Unsigned32 } midcomRuleIndex OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS not-accessible STATUS current DESCRIPTION "The value of this object must be unique in combination with the values of the objects midcomSessionOwner and midcomGroupIndex in this row. Allowed values for this index must be read from the midcomSessionTable. The MIDCOM MIB implementation SHOULD ensure that new row can only be generated for values of this index (in combination with midcomSessionOwner and midcomGroupIndex) that have been read from midcomSessionRuleNewIndex." ::= { midcomRuleEntry 3 } midcomRuleAdminStatus OBJECT-TYPE SYNTAX INTEGER { reserve(1), Quittek, Stiemerling, Srisuresh [Page 36] Internet-Draft MIDCOM MIB January 2004 enable(2) } MAX-ACCESS read-create STATUS current DESCRIPTION "The value of this object indicates the desired status of the policy rule. See the definition of midcomRuleOperStatus for a description of the values. When the midcomRuleAdminStatus object is set, then the MIDCOM MIB implementation will try to read the respective relvant objects of the entry and try to achieve the corresponding midcomRuleOperStatus. Depending on whether the midcomRuleAdminStatus is set to reserve(1) or enable(2) several objects must be set in advance. They serve as parameters of the policy rule to be established When object midcomRuleAdminStatus is set to reserve(1), then the following objects in the same entry are of relevance: - midcomRuleNatService - midcomRuleNatInterface - midcomRuleTransportProtocol - midcomRulePortRange - midcomRuleInternalIpVersion - midcomRuleExternalIpVersion - midcomRuleInternalIpAddr - midcomRuleInternalIpPrefixLength - midcomRuleInternalPort - midcomRuleLifetime When object midcomRuleAdminStatus is set to enable(2), then the following objects in the same entry are of relevance: - midcomRuleNatInterface - midcomRuleFlowDirection - midcomRuleMaxIdleTime - midcomRuleTransportProtocol - midcomRulePortRange - midcomRuleInternalIpVersion - midcomRuleExternalIpVersion - midcomRuleInternalIpAddr - midcomRuleInternalIpPrefixLength - midcomRuleInternalPort - midcomRuleExternalIpAddr - midcomRuleExternalIpPrefixLength - midcomRuleExternalPort - midcomRuleLifetime Quittek, Stiemerling, Srisuresh [Page 37] Internet-Draft MIDCOM MIB January 2004 When retrieved, the object returns the last set value. If no value has been set, it returns one of the two possible values." ::= { midcomRuleEntry 4 } midcomRuleOperStatus OBJECT-TYPE SYNTAX INTEGER { newEntry(1), setting(2), checkingRequest(3), incorrectRequest(4), processingRequest(5), requestRejected(6), reserved(7), enabled(8), timedOut(9), terminatedOnRequest(10), terminated(11), genericError(12) } MAX-ACCESS read-only STATUS current DESCRIPTION "The actual status of the policy rule. The midcomRuleOperStatus object may have the following values: - newEntry(1) indicates that the entry in the midcomRuleTable was created, but not modified yet. Such an entry needs to be filled with values specifying a request first. - setting(2) indicates that the entry has been already modified after generating it, but no request was made yet. - checkingRequest(3) indicates that midcomRuleAdminStatus has recently been set and that the MIDCOM MIB implementation is currently checking the parameters of the request. This is a transient state. The value of this object will change to either incorrectRequest(4) or processingRequest(5) without any external interaction. A MIDCOM MIB implementation MAY return this value while checking request parameters. - incorrectRequest(4) indicates that checking a request resulted in detecting an incorrect value in one of the objects containing request parameters. The failure reason is indicated by the value of midcomRuleError. - processingRequest(5) indicates that Quittek, Stiemerling, Srisuresh [Page 38] Internet-Draft MIDCOM MIB January 2004 midcomRuleAdminStatus has recently been set and that the MIDCOM MIB implementation is currently processing the request and trying to configure the middlebox accordingly. This is a transient state. The value of this object will change to either requestRejected(6), reserved(7) or enabled(8) without any external interaction. A MIDCOM MIB implementation MAY return this value while processing a request. - requestRejected(6) indicates that a request to establish a policy rule specified by the entry was rejected. The reason of rejection is indicated by the value of midcomRuleError. - reserved(7) indicates that the entry describes an established policy reserve rule. These values of MidcomRuleEntry can be retrieved for a reserved policy rule: - midcomRuleNatService - midcomRuleNatInterface - midcomRuleTransportProtocol - midcomRulePortRange - midcomRuleInternalIpVersion - midcomRuleExternalIpVersion - midcomRuleInternalIpAddr - midcomRuleInternalIpPrefixLength - midcomRuleInternalPort - midcomRuleOutsideIpAddr - midcomRuleOutsidePort - midcomRuleLifetime - enabled(8) indicates that the entry describes an established policy enable rule. These values of MidcomRuleEntry can be retrieved for an enabled policy rule - midcomRuleNatService - midcomRuleNatInterface - midcomRuleFlowDirection - midcomRuleMaxIdleTime - midcomRuleTransportProtocol - midcomRulePortRange - midcomRuleInternalIpVersion - midcomRuleExternalIpVersion - midcomRuleInternalIpAddr - midcomRuleInternalIpPrefixLength - midcomRuleInternalPort - midcomRuleExternalIpAddr - midcomRuleExternalIpPrefixLength - midcomRuleExternalPort - midcomRuleInsideIpAddr Quittek, Stiemerling, Srisuresh [Page 39] Internet-Draft MIDCOM MIB January 2004 - midcomRuleInsidePort - midcomRuleOutsideIpAddr - midcomRuleOutsidePort - midcomRuleLifetime - timedOut(9) indicates that the lifetime of a previously established policy rule is expired and that the policy rule is terminated for this reason. - terminatedOnRequest(10) indicates that a previously established policy rule was terminated by an SNMP manager setting the midcomRuleLifetime to 0 or setting midcomGroupLifetime to 0. - terminated(11) indicates that a previously established policy rule was terminated by the MIDCOM MIB implementation for another reason than lifetime expiration or an explicit request from an SNMP manager. - genericError(12) indicates that the policy rule specified by the entry is not established due to an error condition not listed above. The states timedOut(9), terminatedOnRequest(10) and terminated(11) are referred to as termination states. The states incorrectRequest(4), requestRejected(6) and genericError(12) are referred to as error states. The checkingRequest(3) and processingRequest(4) states are transient states which will either lead to one of the error states or the reserved(7) state or the enabled(8) states. MIDCOM MIB implementations MAY return these values when checking or processing requests." DEFVAL { newEntry } ::= { midcomRuleEntry 5 } midcomRuleStorageType OBJECT-TYPE SYNTAX StorageType MAX-ACCESS read-create STATUS current DESCRIPTION "When retrieved, this object returns the storage type of the policy rule. Writing to this object can change the storage type of the particular row from volatile(2) to nonVolatile(3) or vice versa. Attempts to set this object to permanent will always fail with an inconsistentValue error. Quittek, Stiemerling, Srisuresh [Page 40] Internet-Draft MIDCOM MIB January 2004 If midcomRuleStorageType has the value permanent(4), then all objects in this row whose MAX-ACCESS value is read-create must be read-only." DEFVAL { volatile } ::= { midcomRuleEntry 6 } midcomRuleStorageTime OBJECT-TYPE SYNTAX Unsigned32 UNITS "seconds" MAX-ACCESS read-create STATUS current DESCRIPTION "The value of this object specifies how long this row can exist in the midcomRuleTable after the midcomRuleOperState switched to a termination state or to an error state. This object returns the remaining time that the row may exist before it is aged out. The object is initialized with the value of the associated midcomSessionStorageTime object. After expiration or termination of the context, the value of this object ticks backwards. The entry in the midcomRuleTable is destroyed when the value reaches 0. The value of this object may be set in order to increase or reduce the remaining time that the row may exist. Setting the value to 0 will destroy this entry as soon as the midcomRuleOperState switched to a termination state or to an error state. Note that there is no guarantee that the row is stored as long as this object indicates. At any time, the MIDCOM MIB implementation may decide to remove a row describing a terminated policy rule before the storage time of the corresponding row in the midcomRuleTable reaches the value of 0. In this case the information stored in this row is not anymore available." DEFVAL { 0 } ::= { midcomRuleEntry 7 } midcomRuleError OBJECT-TYPE SYNTAX SnmpAdminString MAX-ACCESS read-only STATUS current DESCRIPTION "This object contains a descriptive error message if the transition into the operational status reserved(7) or enabled(8) failed. Implementations must reset the error message to a zero-length string when a new Quittek, Stiemerling, Srisuresh [Page 41] Internet-Draft MIDCOM MIB January 2004 attempt to change the policy rule status to reserved(7) or enabled(8) is started. RECOMMENDED values to be returned in particular cases include - 'lack of IP addresses' - 'lack of port numbers' - 'lack of resources' - 'specified NAT interface does not exist' - 'specified NAT interface does not support NAT' - 'conflict with already existing policy rule' - 'no internal IP wildcarding allowed' - 'no external IP wildcarding allowed'" DEFVAL { ''H } ::= { midcomRuleEntry 8 } midcomRuleNatService OBJECT-TYPE SYNTAX INTEGER { any(1), traditionalNat(2), twiceNat(3) } MAX-ACCESS read-create STATUS current DESCRIPTION "This object indicates a kind of NAT service. This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has the value newEntry(1) or setting(2), then this object can be written by a manager in order to request its preference concerning the NAT service. Writing to this object in any state other than newEntry(1) or setting(2) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value reserved(7) or enabled(8), then this object indicates which NAT service is performed for this rule. If not NAT service is required for enforcing the policy rule, then the value of this object is any(1). If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { any } ::= { midcomRuleEntry 9 } Quittek, Stiemerling, Srisuresh [Page 42] Internet-Draft MIDCOM MIB January 2004 midcomRuleNatInterface OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-create STATUS current DESCRIPTION "This object indicates an IP interface at which NAT service is requested, or performed. The interface is identified by its index in the ifTable (see IF-MIB in RFC2863). If the object has a value of 0, then no particular interface is indicated. This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has the value newEntry(1) or setting(2), then this object can be written by a manager in order to request its preference concerning the interface at which it requests NAT service. The default value of 0 indicates that the manager does not have a preferred interface or does not have sufficient topology information for specifying one. Writing to this object in any state other than newEntry(1) or setting(2) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value reserved(7) or enabled(8), then this object indicates the interface at which NAT service for this rule is performed. If not NAT service is required for enforcing the policy rule, then the value of this object is 0. Also if the MIDCOM MIB implementation cannot indicate an interface, because it does not have this information or because NAT service is not offered at a particular single interface, then the value of the object is 0. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { 0 } ::= { midcomRuleEntry 10 } midcomRuleFlowDirection OBJECT-TYPE SYNTAX INTEGER { inbound(1), outbound(2), biDirectional(3) } MAX-ACCESS read-create STATUS current DESCRIPTION Quittek, Stiemerling, Srisuresh [Page 43] Internet-Draft MIDCOM MIB January 2004 "This parameter specifies the direction of enabled communication, either inbound(1), outbound(2), or biDirectional(3). The semantics of this object depends on the protocol the rule relates to. If the rule is independent of the transport protocol (midcomRuleTransportProtocol has value of 0) or if the transport protocol is UDP, then the value of midcomRuleFlowDirection indicates the direction of packets traversing the middlebox. In this case, value inbound(1) indicates that packets are traversing from outside to inside, value outbound(2) indicates that packets are traversing from inside to outside. For both values, inbound(1) and outbound(2) packets can traverse the middelbox only uni-directional. A bi-directional flow is indicated by value biDirectional(3). If the transport protocol is TCP, the packet flow is always bi-directional, but the value of midcomRuleFlowDirection indicates that: - inbound(1): bi-directional TCP packet flow. First packet, with TCP SYN flag set, must arrive at an outside interface of the middlebox. - outbound(2): bi-directional TCP packet flow. First packet, with TCP SYN flag set, must arrive at an inside interface of the middlebox. - biDirectional(3): bi-directional TCP packet flow. First packet, with TCP SYN flag set, may arrive at an inside or an outside interface of the middlebox. This object is used as input to a request for establishing a policy enable rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has a value of either newEntry(1), setting(2) or reserved(7), then this object can be written by a manager in order to specify a requested direction to be enabled by a policy rule. Writing to this object in any state other than newEntry(1), setting(2) or reserved(7) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value enabled(8), then this object indicates the enabled flow direction. Quittek, Stiemerling, Srisuresh [Page 44] Internet-Draft MIDCOM MIB January 2004 If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." ::= { midcomRuleEntry 11 } midcomRuleMaxIdleTime OBJECT-TYPE SYNTAX Unsigned32 UNITS "seconds" MAX-ACCESS read-create STATUS current DESCRIPTION "Maximum idle time of the policy rule in seconds. If no packet to which the policy rule applies passes the middlebox for the specified midcomRuleMaxIdleTime, then the policy rule enters the termination state timedOut(9). A value of 0 indicates that the policy does not time out if it is idle. This object is used as input to a request for establishing a policy enable rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has a value of either newEntry(1), setting(2) or reserved(7), then this object can be written by a manager in order to specify a maximum idle time for the policy rule to be requested. Writing to this object in any state other than newEntry(1), setting(2) or reserved(7) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value enabled(8), then this object indicates the maximum idle time of the policy rule. Note that even if a maximum idle time greater than zero was requested, the middlebox may not be able to support maximum idle times and set the value of thie object to zero when entering state enabled(8). If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { 0 } ::= { midcomRuleEntry 12 } midcomRuleTransportProtocol OBJECT-TYPE SYNTAX Unsigned32 (0..255) MAX-ACCESS read-write STATUS current DESCRIPTION Quittek, Stiemerling, Srisuresh [Page 45] Internet-Draft MIDCOM MIB January 2004 "The transport protocol. Valid values for midcomRuleTransportProtocol are the onces defined at: http://www.iana.org/assignments/protocol-numbers This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has a value of either newEntry(1) or setting(2), then this object can be written by a manager in order to specify a requested transport protocol. If translation of a full IP address is requested, then this object must have the default value 0. Writing to this object in any state other than newEntry(1) or setting(2) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value reserved(7) or enabled(8), then this object indicates which transport protocol is enforced by this policy rule. A value of 0 indicates a rule acting on IP addresses only. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { 0 } ::= { midcomRuleEntry 13 } midcomRulePortRange OBJECT-TYPE SYNTAX INTEGER { single(1), pair(2) } MAX-ACCESS read-create STATUS current DESCRIPTION "The range of port numbers. This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. It is relevant to the operation of the MIDCOM MIB implementation only if the value of object midcomTransportProtocol in the same entry has a value other than 0. If object midcomRuleOperStatus of the same entry has the value newEntry(1) or setting(2), then this object can be Quittek, Stiemerling, Srisuresh [Page 46] Internet-Draft MIDCOM MIB January 2004 written by a manager in order to specify the requested size of the port range. With single(1) just a single port number is requested, with pair(2) a consecutive pair of port numbers is requested with the lower number being even. Requestimng the a consecutive pair of port numbers is required for supporting the RTP and RTCP protocols, see RFC1889. Writing to this object in any state other than newEntry(1), setting(2) or reserved(7) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has a value of either reserved(7) or enabled(8), then this object will have the value which it had before the transition to this state. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { single } ::= { midcomRuleEntry 14} midcomRuleInternalIpVersion OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS read-create STATUS current DESCRIPTION "IP version of the internal address (A0) and the inside address (A1). Allowed values are ipv4(1) and ipv6(2). This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has the value newEntry(1) or setting(2), then this object can be written by a manager in order to specify the IP version reuqired at the inside of the middlebox. Writing to this object in any state other than newEntry(1) or setting(2) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value reserved(7) or enabled(8), then this object indicates the internal/inside IP version. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { ipv4 } ::= { midcomRuleEntry 15 } Quittek, Stiemerling, Srisuresh [Page 47] Internet-Draft MIDCOM MIB January 2004 midcomRuleExternalIpVersion OBJECT-TYPE SYNTAX InetAddressType MAX-ACCESS read-create STATUS current DESCRIPTION "IP version of the external address (A3) and the outside address (A2). Allowed values are ipv4(1) and ipv6(2). This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has the value newEntry(1) or setting(2), then this object can be written by a manager in order to specify the IP version reuqired at the outside of the middlebox. Writing to this object in any state other than newEntry(1) or setting(2) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value reserved(7) or enabled(8), then this object indicates the external/outside IP version. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { ipv4 } ::= { midcomRuleEntry 16 } midcomRuleInternalIpAddr OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS read-create STATUS current DESCRIPTION "The internal IP address. This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has the value newEntry(1) or setting(2), then this object can be written by a manager in order to specify the internal IP address for which a reserve policy rule or a enable policy rule is requested to be established. Writing to this object in any state other than newEntry(1) or setting(2) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the Quittek, Stiemerling, Srisuresh [Page 48] Internet-Draft MIDCOM MIB January 2004 value reserved(7) or enabled(8), then this object will have the value which it had before the transition to this state. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." ::= { midcomRuleEntry 17 } midcomRuleInternalIpPrefixLength OBJECT-TYPE SYNTAX Unsigned32 (0..128) MAX-ACCESS read-create STATUS current DESCRIPTION "The prefix length of the internal IP address used for wildcarding. A value of 0 indicates a full wildcard; in this case the value of midcomRuleInternalIpAddr is irrelevant. If midcomRuleInternalIpVersion has a value of ipv4(1) then a value > 31 indicates no wildcarding at all. If midcomRuleInternalIpVersion has a value of ipv4(2) then a value > 127 indicates no wildcarding at all. A MIDCOM MIB implementation that does not support IP address wildcarding MUST implement this object as read-only with a value of 128. A MIDCOM that does not support wildcarding based on prefix length MAY restrict allowed values for this object to 0 and 128. This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has the value newEntry(1) or setting(2), then this object can be written by a manager in order to specify the internal IP address for which a reserve policy rule or a enable policy rule is requested to be established. Writing to this object in any state other than newEntry(1) or setting(2) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value reserved(7) or enabled(8), then this object will have the value which it had before the transition to this state. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { 128 } ::= { midcomRuleEntry 18 } Quittek, Stiemerling, Srisuresh [Page 49] Internet-Draft MIDCOM MIB January 2004 midcomRuleInternalPort OBJECT-TYPE SYNTAX InetPortNumber MAX-ACCESS read-create STATUS current DESCRIPTION "The internal port number. A value of 0 is a wildcard. This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. It is relevant to the operation of the MIDCOM MIB implementation only if the value of object midcomTransportProtocol in the same entry has a value other than 0. If object midcomRuleOperStatus of the same entry has the value newEntry(1) or setting(2), then this object can be written by a manager in order to specify the port number for which a reserve policy rule or a enable policy rule is requested to be established. Writing to this object in any state other than newEntry(1) or setting(2) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value reserved(7) or enabled(8), then this object will have the value which it had before the transition to this state. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { 0 } ::= { midcomRuleEntry 19 } midcomRuleExternalIpAddr OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS read-create STATUS current DESCRIPTION "The external IP address. This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has the value newEntry(1), setting(2) or reserved(7), then this object can be written by a manager in order to specify the external IP address for which an enable policy rule is requested to be established. Writing to this object in any state other than newEntry(1), setting(2) or reserved(7) Quittek, Stiemerling, Srisuresh [Page 50] Internet-Draft MIDCOM MIB January 2004 will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value enabled(8), then this object will have the value which it had before the transition to this state. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." ::= { midcomRuleEntry 20 } midcomRuleExternalIpPrefixLength OBJECT-TYPE SYNTAX Unsigned32 (0..128) MAX-ACCESS read-create STATUS current DESCRIPTION "The prefix length of the external IP address used for wildcarding. A value of 0 indicates a full wildcard; in this case the value of midcomRuleExternalIpAddr is irrelevant. If midcomRuleExternalIpVersion has a value of ipv4(1) then a value > 31 indicates no wildcarding at all. If midcomRuleExternalIpVersion has a value of ipv4(2) then a value > 127 indicates no wildcarding at all. A MIDCOM MIB implementation that does not support IP address wildcarding MUST implement this object as read-only with a value of 128. A MIDCOM that does not support wildcarding based on prefix length MAY restrict allowed values for this object to 0 and 128. This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has the value newEntry(1), setting(2) or reserved(7), then this object can be written by a manager in order to specify the external IP address for which an enable policy rule is requested to be established. Writing to this object in any state other than newEntry(1), setting(2) or reserved(7) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value enabled(8), then this object will have the value which it had before the transition to this state. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { 128 } ::= { midcomRuleEntry 21 } Quittek, Stiemerling, Srisuresh [Page 51] Internet-Draft MIDCOM MIB January 2004 midcomRuleExternalPort OBJECT-TYPE SYNTAX InetPortNumber MAX-ACCESS read-create STATUS current DESCRIPTION "The external port number. A value of 0 is a wildcard. This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. It is relevant to the operation of the MIDCOM MIB implementation only if the value of object midcomTransportProtocol in the same entry has a value other than 0. If object midcomRuleOperStatus of the same entry has the value newEntry(1), setting(2) or reserved(7), then this object can be written by a manager in order to specify the external port number for which an enable policy rule is requested to be established. Writing to this object in any state other than newEntry(1), setting(2) or reserved(7) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has the value enabled(8), then this object will have the value which it had before the transition to this state. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { 0 } ::= { midcomRuleEntry 22 } midcomRuleInsideIpAddr OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS read-only STATUS current DESCRIPTION "The inside IP address at the middlebox. This the value of this object is relevant only if object midcomRuleOperStatus of the same entry has a value of either reserved(7) or enabled(8)." ::= { midcomRuleEntry 23 } midcomRuleInsidePort OBJECT-TYPE SYNTAX InetPortNumber MAX-ACCESS read-only STATUS current DESCRIPTION "The inside port number at the middlebox. Quittek, Stiemerling, Srisuresh [Page 52] Internet-Draft MIDCOM MIB January 2004 A value of 0 is a wildcard. This the value of this object is relevant only if object midcomRuleOperStatus of the same entry has a value of either reserved(7) or enabled(8)." ::= { midcomRuleEntry 24 } midcomRuleOutsideIpAddr OBJECT-TYPE SYNTAX InetAddress MAX-ACCESS read-only STATUS current DESCRIPTION "The outside IP address at the middlebox. This the value of this object is relevant only if object midcomRuleOperStatus of the same entry has a value of either reserved(7) or enabled(8)." ::= { midcomRuleEntry 25 } midcomRuleOutsidePort OBJECT-TYPE SYNTAX InetPortNumber MAX-ACCESS read-only STATUS current DESCRIPTION "The outside port number at the middlebox. A value of 0 is a wildcard. This the value of this object is relevant only if object midcomRuleOperStatus of the same entry has a value of either reserved(7) or enabled(8)." ::= { midcomRuleEntry 26 } midcomRuleLifetime OBJECT-TYPE SYNTAX Unsigned32 UNITS "seconds" MAX-ACCESS read-create STATUS current DESCRIPTION "The remaining lifetime in seconds of this policy rule. Lifetime of a policy rule starts when object midcomRuleOperStatus in the same entry enters either state reserved(7) or state enabled(8). This object is used as input to a request for establishing a policy rule as well as for indicating the properties of an established policy rule. If object midcomRuleOperStatus of the same entry has a value of either newEntry(1) or setting(2), then this Quittek, Stiemerling, Srisuresh [Page 53] Internet-Draft MIDCOM MIB January 2004 object can be written by a manager in order to specify the requested lifetime of a policy rule to be established. If object midcomRuleOperStatus of the same entry has a value of either reserved(7) or enabled(8), indicates the (continuously decreasing) remaining lifetime of the established policy rule. Note that when entering state reserved(7) or enabled(8), the MIDCOM MIB implementation can choose a lifetime shorter than the one requested. Unlike other parameters of the policy rule, this parameter can still be written in state reserved(7) and enabled(8). Writing to this object is processed by the MIDCOM MIB implementation according to the processing of a Policy Rule Lifetime Change (RLC) request as specified in RFC XXXX. Therefore, SNMP set requests to this object may be rejected or the value of the object after an accepted set operation may be less than the value that was contained in the SNMP set request. Successfully writing a value of 0 terminates the policy rule. Note that after a policy rule is terminated, still the entry will exist as long as indicated by the value of midcomRuleStorageTime. Writing to this object in any state other than newEntry(1), setting(2), reserved(7) or enabled(7) will always fail with an inconsistentValue error. If object midcomRuleOperStatus of the same entry has a value other than newEntry(1), setting(2), reserved(7) or enabled(8), then the value of this object is irrelevant." DEFVAL { 180 } ::= { midcomRuleEntry 27 } -- -- Policy rule group group -- -- The midcomGroupTable lists all current policy rule groups. -- midcomGroupTable OBJECT-TYPE SYNTAX SEQUENCE OF MidcomGroupEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "This table lists all current policy rule groups. Entries in this table are created implicitely when entries in the midcomRuleTable are created. Quittek, Stiemerling, Srisuresh [Page 54] Internet-Draft MIDCOM MIB January 2004 Like the midcomSessionTable and the midcomRuleTable, this table is indexed by an owner and an index that is unique per owner. The table serves for listing the existing groups and their remaining lifetimes and for changing lifetimes of groups and implicitly of all group members. Groups and all their member policy rules can be deleted by setting midcomGroupLifetime to 0." ::= { midcomSignaling 4 } midcomGroupEntry OBJECT-TYPE SYNTAX MidcomGroupEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "An entry describing a particular MIDCOM session." INDEX { midcomSessionOwner, midcomGroupIndex } ::= { midcomGroupTable 1 } MidcomGroupEntry ::= SEQUENCE { midcomGroupIndex Unsigned32, midcomGroupLifetime Unsigned32 } midcomGroupIndex OBJECT-TYPE SYNTAX Unsigned32 (1..4294967295) MAX-ACCESS not-accessible STATUS current DESCRIPTION "The index of this group for the midcomSessionOwner. A group is identified by the combination of midcomSessionOwner and midcomGroupIndex. The value of this index must be unique per midcomSessionOwner." ::= { midcomGroupEntry 2 } midcomGroupLifetime OBJECT-TYPE SYNTAX Unsigned32 UNITS "seconds" MAX-ACCESS read-write STATUS current DESCRIPTION "When retrieved, this object delivers the the maximum lifetime in seconds of all member rules of this group, i.e. of all rows in the midcomRuleTable that have the same values for midcomSessionOwner and midcomGroupIndex. Successfully writing to this object modifies the Quittek, Stiemerling, Srisuresh [Page 55] Internet-Draft MIDCOM MIB January 2004 lifetime of all member policies. Successfully writing a value of 0 terminates all member policies and implicitly deletes the group as soon as all member entries are removed from the midcomRuleTable. Note that after a group's lifetime is expired or is set to 0, still the corresponding entry in the midcomGroupTable will exist as long as terminated member policy rules are stored as entries in the midcomRuleTable. Writing to this object is processed by the SNMP agent according to the processing of a Group Lifetime Change (GLC) request as specified in RFC XXXX. Therefore, SNMP set requests to this object might be rejected or the value of the object after an accepted set operation may be different from the value that was contained in the SNMP set request." ::= { midcomGroupEntry 3 } -- -- Configuration Objects -- -- Configuration objects that can be used for retrieving -- middlebox capability information (mandatory) and for -- setting parameters of the implementation of objects in -- the signaling branch (optional). -- -- Note that typically, objects in the configuration branch -- are not intended to be written by MIDCOM clients. In general, -- write access to these objects needs to be restricted more -- strictly than write access to objects in the signaling branch. -- -- -- Capabilities Group -- -- This group contains objects to which MIDCOM clients should -- have read access. -- midcomConfigMaxLifetime OBJECT-TYPE SYNTAX Unsigned32 UNITS "seconds" MAX-ACCESS read-write STATUS current DESCRIPTION "When retrieved, this object returns the maximum lifetime in seconds, that this middlebox allows policy rules to Quittek, Stiemerling, Srisuresh [Page 56] Internet-Draft MIDCOM MIB January 2004 have." ::= { midcomConfig 1 } midcomConfigPersistentRules OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-write STATUS current DESCRIPTION "When retrieved, this object returns true(1) if the MIDCOM-MIB implementation can store policy rules persistently. Otherwise, it returns false(2)." ::= { midcomConfig 2 } midcomConfigIfTable OBJECT-TYPE SYNTAX SEQUENCE OF MidcomConfigIfEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "This table capabilities of the MIDCOM-MIB implementation per IP interface. It is indexed by ifIndex. If an entry with ifIndex = 0 occurs, then bits set in objects of this entry apply to all interfaces." ::= { midcomConfig 3 } midcomConfigIfEntry OBJECT-TYPE SYNTAX MidcomConfigIfEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "An entry describing The capabilites of a middlebox with respect to the indexed IP interface." INDEX { ifIndex } ::= { midcomConfigIfTable 1 } MidcomConfigIfEntry ::= SEQUENCE { midcomConfigIfBits BITS, midcomConfigIfEnabled TruthValue } midcomConfigIfBits OBJECT-TYPE SYNTAX BITS { ipv4(0), ipv6(1), addressWildcards(2), portWildcards(3), firewall(4), nat(5), Quittek, Stiemerling, Srisuresh [Page 57] Internet-Draft MIDCOM MIB January 2004 portTranslation(6), protocolTranslation(7), twiceNat(8), inside(9) } MAX-ACCESS read-only STATUS current DESCRIPTION "When retrieved, this object returns a set of bits indicating the capabilities (or configuration) of the middlebox with repect to the referenced IP interface. If the index equals 0, then all set bits apply to all interfaces. If the ipv4(0) bit is set, then the middlebox supports IPv4 at the indexed IP interface. If the ipv6(1) bit is set, then the middlebox supports IPv4 at the indexed IP interface. If the addressWildcards(2) bit is set, then the middlebox supports IP address wildcarding at the indexed IP interface. If the portWildcards(3) bit is set, then the middlebox supports port wildcarding at the indexed IP interface. If the firewall(4) bit is set, then the middlebox offers firewall functionality at the indexed interface. If the nat(5) bit is set, then the middlebox offers network address translation service at the indexed interface. If the portTranslation(6) bit is set, then the middlebox offers port translation service at the indexed interface. This bit is only relevant if nat(5) is set. If the protocolTranslation(7) bit is set, then the middlebox offers protocol translation service between IPv4 and IPv6 at the indexed interface. This bit is only relevant if nat(5) is set. If the twiceNat(8) bit is set, then the middlebox offers twice network address translation service at the indexed interface. This bit is only relevant if nat(5) is set. If the inside(9) bit is set, then the indexed interface is an inside interface with respect to NAT functionality. Quittek, Stiemerling, Srisuresh [Page 58] Internet-Draft MIDCOM MIB January 2004 Otherwise, it is an outside interface. This bit is only relevant if nat(5) is set." ::= { midcomConfigIfEntry 2 } midcomConfigIfEnabled OBJECT-TYPE SYNTAX TruthValue MAX-ACCESS read-write STATUS current DESCRIPTION "The value of this object indicates the availability of the middlebox service described by midcomCapabilitiesBits at the indexed IP interface. By writing to this object, the MIDCOM support for the entire IP interface can be switched on or off. Setting this object to false(2) immeadiately stops middlebox support at the indexed IP interface. This implies that all policy rules that use NAT or firewall resources at the indexed IP interface are terminated immediately. In this case, The midcom agent MUST send notifications to all MIDCOM clients with open sessions that have access to one of the terminated rules." DEFVAL { true } ::= { midcomConfigIfEntry 3 } -- -- Firewall Group -- -- This group contains the firewall configuration table -- midcomConfigFirewallTable OBJECT-TYPE SYNTAX SEQUENCE OF MidcomConfigFirewallEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "This table lists the firewall configuration per IP interface. It can be used for configuring configuring how policy rules created by MIDCOM clients are realized as firewall rules of a firewall implementation. Particularly, the priority used for MIDCOm policy rules can be configured. For a single firewall implementation at a particular IP interface, all MIDCOM policy rules are realized as firewall rules with the same priority. Also a firewall rule group name can be configured. The table is indexed by the IP interface index." ::= { midcomConfig 4 } Quittek, Stiemerling, Srisuresh [Page 59] Internet-Draft MIDCOM MIB January 2004 midcomConfigFirewallEntry OBJECT-TYPE SYNTAX MidcomConfigFirewallEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "An entry describing a particular set of firewall resources." INDEX { ifIndex } ::= { midcomConfigFirewallTable 1 } MidcomConfigFirewallEntry ::= SEQUENCE { midcomConfigFirewallGroupId SnmpAdminString, midcomConfigFirewallPriority Unsigned32 -- Wes, what should be here? } midcomConfigFirewallGroupId OBJECT-TYPE SYNTAX SnmpAdminString MAX-ACCESS read-write STATUS current DESCRIPTION "The firewall rule group to which all firewall rules of the MIDCOM server are assigned." ::= { midcomConfigFirewallEntry 2 } midcomConfigFirewallPriority OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-write STATUS current DESCRIPTION "The priority assigned to all firewall rules of the MIDCOM server." ::= { midcomConfigFirewallEntry 3 } -- -- Monitoring Objects -- -- Monitoring objects are structured into two groups, -- the midcomResourceGroup providing infomation about used -- resources and the midcomStatisticsGroup providing information -- about MIDCOM signaling statistics. -- -- Resources group -- -- The MIDCOM resources group contains a set of managed -- objects describing the currently used resources of NAT -- and firewall implementations. -- Quittek, Stiemerling, Srisuresh [Page 60] Internet-Draft MIDCOM MIB January 2004 -- -- Textual conventions for objects of the resource group -- MidcomNatBindMode ::= TEXTUAL-CONVENTION STATUS current DESCRIPTION "An indicator of the kind of NAT resources used by a policy rule. This definition corresponds to the definition of NatBindMode in the NAT-MIB (RFCXXXX). Value none(3) can be used to indicate that the policy rule does not use any NAT binding. " SYNTAX INTEGER { addressBind(1), addressPortBind(2), none(3) } MidcomNatSessionIdOrZero ::= TEXTUAL-CONVENTION DISPLAY-HINT "d" STATUS current DESCRIPTION "A unique ID that is assigned to each NAT session by a NAT implementation. This definition corresponds to the definition of NatSessionId in the NAT-MIB (RFCXXXX). Value 0 can be used to indicate that policy rule does not use any NAT binding" SYNTAX Unsigned32 -- -- The MIDCOM resource table -- midcomResourceTable OBJECT-TYPE SYNTAX SEQUENCE OF MidcomResourceEntry MAX-ACCESS not-accessible STATUS current DESCRIPTION "This table lists all used middlebox resources per MIDCOM policy rule. The midcomResourceTable is indexed by session owner, group index, rule index. " ::= { midcomMonitoring 1 } midcomResourceEntry OBJECT-TYPE SYNTAX MidcomResourceEntry MAX-ACCESS not-accessible Quittek, Stiemerling, Srisuresh [Page 61] Internet-Draft MIDCOM MIB January 2004 STATUS current DESCRIPTION "An entry describing a particular set of middlebox resources." INDEX { midcomSessionOwner, midcomGroupIndex, midcomRuleIndex } ::= { midcomResourceTable 1 } MidcomResourceEntry ::= SEQUENCE { midcomRscNatInternalAddrBindMode MidcomNatBindMode, midcomRscNatInternalAddrBindId NatBindIdOrZero, midcomRscNatExternalAddrBindMode MidcomNatBindMode, midcomRscNatExternalAddrBindId NatBindIdOrZero, midcomRscNatSessionId1 MidcomNatSessionIdOrZero, midcomRscNatSessionId2 MidcomNatSessionIdOrZero, midcomRscFirewallRuleId Unsigned32 -- more input required on firewall resource information. } midcomRscNatInternalAddrBindMode OBJECT-TYPE SYNTAX MidcomNatBindMode MAX-ACCESS read-only STATUS current DESCRIPTION "An indication whether this policy rule uses an address NAT bind or an address-port NAT bind for binding the internal address." ::= { midcomResourceEntry 4 } midcomRscNatInternalAddrBindId OBJECT-TYPE SYNTAX NatBindIdOrZero MAX-ACCESS read-only STATUS current DESCRIPTION "The allocated NAT bind for the internal address used by this policy rule." ::= { midcomResourceEntry 5 } midcomRscNatExternalAddrBindMode OBJECT-TYPE SYNTAX MidcomNatBindMode MAX-ACCESS read-only STATUS current DESCRIPTION "An indication whether this policy rule uses an address NAT bind or an address-port NAT bind for binding the external address." ::= { midcomResourceEntry 6 } midcomRscNatExternalAddrBindId OBJECT-TYPE SYNTAX NatBindIdOrZero MAX-ACCESS read-only Quittek, Stiemerling, Srisuresh [Page 62] Internet-Draft MIDCOM MIB January 2004 STATUS current DESCRIPTION "The allocated NAT bind for the external address used by this policy rule." ::= { midcomResourceEntry 7 } midcomRscNatSessionId1 OBJECT-TYPE SYNTAX MidcomNatSessionIdOrZero MAX-ACCESS read-only STATUS current DESCRIPTION "A unique ID that is assigned to this specific NAT session at the NAT for this policy rule. A maximum of two NAT sessions can be assigned to one policy rule." ::= { midcomResourceEntry 8 } midcomRscNatSessionId2 OBJECT-TYPE SYNTAX MidcomNatSessionIdOrZero MAX-ACCESS read-only STATUS current DESCRIPTION "A unique ID that is assigned to this specific NAT session at the NAT for this policy rule. A maximum of two NAT sessions can be assigned to one policy rule." ::= { midcomResourceEntry 9 } midcomRscFirewallRuleId OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "A unique ID that is assigned to this specific firewall rule at the firewall for this policy rule." ::= { midcomResourceEntry 10 } -- -- Statistics group -- -- The MIDCOM statistics group contains a set of managed -- objects providing statistics about the usage of objects -- in the signaling branch. -- midcomStatistics OBJECT IDENTIFIER ::= { midcomMonitoring 2 } midcomSessionsRejected OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only Quittek, Stiemerling, Srisuresh [Page 63] Internet-Draft MIDCOM MIB January 2004 STATUS current DESCRIPTION "The number of rejected MIDCOM sessions. The MIDCOM MIB module can rejected sessions that are not authorized or unknown." ::= { midcomStatistics 1 } midcomSessionsCurrent OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The number of currently established MIDCOM sessions. This object equals the number of rows in the midcomSessionTable and gives the number of MIDCOM clients (=SNMP managers) that are allowed to read, create, or modify entries in the MIDCOM MIB module." ::= { midcomStatistics 2 } midcomSessionsTotal OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The summarized number of all current and past established MIDCOM sessions." ::= { midcomStatistics 3 } midcomRuleEntriesRejected OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The number of failed attempts to create an entry in the midcomRuleTable." ::= { midcomStatistics 4 } midcomRulesIncomplete OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of policy rules that are incomplete. Policy rules are loaded via row entries in midcomRuleTable. This object counts policy Quittek, Stiemerling, Srisuresh [Page 64] Internet-Draft MIDCOM MIB January 2004 rules that are loaded but not fully specified, i.e. the associated action (reserved or enable) is not set. Those rule are typically removed after sometime and counted." ::= { midcomStatistics 5 } midcomReserveRulesIncorrect OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of policy reserve rules that failed parameter check and entered state incorrectRequest(4)." ::= { midcomStatistics 6 } midcomReserveRulesRejected OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of policy reserve rules that failed while being processed and entered state requestRejected(6)." ::= { midcomStatistics 7 } midcomReserveRulesActive OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The number of currently active policy reserve rules." ::= { midcomStatistics 8 } midcomReserveRulesExpired OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of expired policy reserve rules (entered termination state timedOut(9))." ::= { midcomStatistics 9 } midcomReserveRulesTerminatedOnRq OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of policy reserve rules that were terminated on request (entered termination state terminatedOnRequest(10))." ::= { midcomStatistics 10 } Quittek, Stiemerling, Srisuresh [Page 65] Internet-Draft MIDCOM MIB January 2004 midcomReserveRulesTerminated OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of policy reserve rules that were terminated, but not on request. (entered termination state terminated(11))." ::= { midcomStatistics 11 } midcomEnableRulesIncorrect OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of policy enable rules that failed parameter check and entered state incorrectRequest(4)." ::= { midcomStatistics 12 } midcomEnableRulesRejected OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of policy enable rules that failed while being processed and entered state requestRejected(6)." ::= { midcomStatistics 13 } midcomEnableRulesActive OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The number of currently active policy enable rules." ::= { midcomStatistics 14 } midcomEnableRulesExpired OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of expired policy enable rules (entered termination state timedOut(9))." ::= { midcomStatistics 15 } midcomEnableRulesTerminatedOnRq OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION Quittek, Stiemerling, Srisuresh [Page 66] Internet-Draft MIDCOM MIB January 2004 "The total number of policy enable rules that were terminated on request (entered termination state terminatedOnRequest(10))." ::= { midcomStatistics 16 } midcomEnableRulesTerminated OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of policy enable rules that were terminated, but not on request. (entered termination state terminated(11))." ::= { midcomStatistics 17 } midcomTransactionsRejected OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of rejected transactions." ::= { midcomStatistics 18 } midcomTransactionsFailed OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of failed transactions." ::= { midcomStatistics 19 } midcomTransactionsCompleted OBJECT-TYPE SYNTAX Unsigned32 MAX-ACCESS read-only STATUS current DESCRIPTION "The total number of completed transactions." ::= { midcomStatistics 20 } -- -- Notifications. The definition of midcomEvent makes notification -- registrations reversible (see STD 58, RFC 2578, Section 8.5). -- midcomEvent OBJECT IDENTIFIER ::= { midcomNotifications 0 } midcomSessionTermination NOTIFICATION-TYPE STATUS current DESCRIPTION Quittek, Stiemerling, Srisuresh [Page 67] Internet-Draft MIDCOM MIB January 2004 "This notification can be generated for indicating that a session is terminated by the middlebox." ::= { midcomEvent 1 } midcomRuleEvent NOTIFICATION-TYPE OBJECTS { midcomRuleOperStatus, midcomRuleLifetime } STATUS current DESCRIPTION "This notification can be generated whenever the value of midcomRuleOperStatus enters one of the following states: reserved, enabled, any error state, any termination state. In addition, it can be generated when the lifetime of a rule was changed by successfully writing to object midcomRuleLifetime." ::= { midcomEvent 2 } midcomGroupEvent NOTIFICATION-TYPE OBJECTS { midcomGroupLifetime } STATUS current DESCRIPTION "This notification can be generated for indicating the change of a policy rule group's lifetime." ::= { midcomEvent 3 } -- -- Conformance information -- midcomCompliances OBJECT IDENTIFIER ::= { midcomConformance 1 } midcomGroups OBJECT IDENTIFIER ::= { midcomConformance 2 } -- -- compliance statements -- -- This is the MIDCOM compliance definition ... -- midcomCompliance MODULE-COMPLIANCE STATUS current DESCRIPTION "The compliance statement for SNMP entities that implement the MIDCOM MIB. Note that compliance with this compliance statement requires compliance with the ifCompliance3 MODULE-COMPLIANCE statement of the IF-MIB [RFC2863]." Quittek, Stiemerling, Srisuresh [Page 68] Internet-Draft MIDCOM MIB January 2004 MODULE -- this module MANDATORY-GROUPS { midcomSessionGroup, midcomRuleGroup, midcomNotificationsGroup, midcomCapabilitiesGroup } GROUP midcomGroupGroup DESCRIPTION "A compliant implementation does not have to implement the midcomGroupGroup." GROUP midcomConfigFirewallGroup DESCRIPTION "A compliant implementation does not have to implement the midcomConfigFirewallGroup." GROUP midcomResourceGroup DESCRIPTION "A compliant implementation does not have to implement the midcomResourceGroup." GROUP midcomStatisticsGroup DESCRIPTION "A compliant implementation does not have to implement the midcomStatisticsGroup." OBJECT midcomRuleInternalIpPrefixLength MIN-ACCESS read-only DESCRIPTION "Write access is not required. When write access is not supported return 128 as the value of this object. A value of 128 means that the function represented by this option is not supported." OBJECT midcomRuleExternalIpPrefixLength MIN-ACCESS read-only DESCRIPTION "Write access is not required. When write access is not supported return 128 as the value of this object. A value of 128 means that the function represented by this option is not supported." OBJECT midcomRuleMaxIdleTime MIN-ACCESS read-only DESCRIPTION "Write access is not required. When write access is not supported return 0 as the value of this object. A value of 0 means that the function represented by this option is not supported." OBJECT midcomConfigMaxLifetime MIN-ACCESS read-only DESCRIPTION "Write access is not required." OBJECT midcomConfigPersistentRules MIN-ACCESS read-only Quittek, Stiemerling, Srisuresh [Page 69] Internet-Draft MIDCOM MIB January 2004 DESCRIPTION "Write access is not required." OBJECT midcomConfigIfEnabled MIN-ACCESS read-only DESCRIPTION "Write access is not required." OBJECT midcomConfigFirewallGroupId MIN-ACCESS read-only DESCRIPTION "Write access is not required." OBJECT midcomConfigFirewallPriority MIN-ACCESS read-only DESCRIPTION "Write access is not required." ::= { midcomCompliances 1 } midcomSessionGroup OBJECT-GROUP OBJECTS { midcomSessionIndexNext, midcomSessionRuleGroupIndex, midcomSessionRuleNewIndex, midcomSessionStorageType, midcomSessionRowStatus } STATUS current DESCRIPTION "A collection of objects providing information about MIDCOM sessions." ::= { midcomGroups 1 } midcomRuleGroup OBJECT-GROUP OBJECTS { midcomRuleAdminStatus, midcomRuleOperStatus, midcomRuleStorageType, midcomRuleStorageTime, midcomRuleError, midcomRuleNatService, midcomRuleNatInterface, midcomRuleFlowDirection, midcomRuleMaxIdleTime, midcomRuleTransportProtocol, midcomRulePortRange, midcomRuleInternalIpVersion, midcomRuleExternalIpVersion, midcomRuleInternalIpAddr, midcomRuleInternalIpPrefixLength, midcomRuleInternalPort, midcomRuleExternalIpAddr, midcomRuleExternalIpPrefixLength, Quittek, Stiemerling, Srisuresh [Page 70] Internet-Draft MIDCOM MIB January 2004 midcomRuleExternalPort, midcomRuleInsideIpAddr, midcomRuleInsidePort, midcomRuleOutsideIpAddr, midcomRuleOutsidePort, midcomRuleLifetime } STATUS current DESCRIPTION "A collection of objects providing information about policy rules." ::= { midcomGroups 2 } midcomGroupGroup OBJECT-GROUP OBJECTS { midcomGroupLifetime } STATUS current DESCRIPTION "A collection of objects providing information about policy rule groups." ::= { midcomGroups 3 } midcomCapabilitiesGroup OBJECT-GROUP OBJECTS { midcomConfigMaxLifetime, midcomConfigPersistentRules, midcomConfigIfBits, midcomConfigIfEnabled } STATUS current DESCRIPTION "A collection of objects providing information about the capabilities of a middlebox." ::= { midcomGroups 4 } midcomConfigFirewallGroup OBJECT-GROUP OBJECTS { midcomConfigFirewallGroupId, midcomConfigFirewallPriority } STATUS current DESCRIPTION "A collection of objects providing information about the firewall rule group and firewall rule priority to be used by firewalls loaded through MIDCOM." ::= { midcomGroups 5 } midcomResourceGroup OBJECT-GROUP OBJECTS { Quittek, Stiemerling, Srisuresh [Page 71] Internet-Draft MIDCOM MIB January 2004 midcomRscNatInternalAddrBindMode, midcomRscNatInternalAddrBindId, midcomRscNatExternalAddrBindMode, midcomRscNatExternalAddrBindId, midcomRscNatSessionId1, midcomRscNatSessionId2, midcomRscFirewallRuleId } STATUS current DESCRIPTION "A collection of objects providing information about the used NAT and firewall resources." ::= { midcomGroups 6 } midcomStatisticsGroup OBJECT-GROUP OBJECTS { midcomSessionsRejected, midcomSessionsCurrent, midcomSessionsTotal, midcomRuleEntriesRejected, midcomRulesIncomplete, midcomReserveRulesIncorrect, midcomReserveRulesRejected, midcomReserveRulesActive, midcomReserveRulesExpired, midcomReserveRulesTerminatedOnRq, midcomReserveRulesTerminated, midcomEnableRulesIncorrect, midcomEnableRulesRejected, midcomEnableRulesActive, midcomEnableRulesExpired, midcomEnableRulesTerminatedOnRq, midcomEnableRulesTerminated, midcomTransactionsRejected, midcomTransactionsFailed, midcomTransactionsCompleted } STATUS current DESCRIPTION "A collection of objects providing statistical information about the MIDCOM server." ::= { midcomGroups 7 } midcomNotificationsGroup OBJECT-GROUP OBJECTS { midcomSessionTermination, midcomRuleEvent, midcomGroupEvent } STATUS current Quittek, Stiemerling, Srisuresh [Page 72] Internet-Draft MIDCOM MIB January 2004 DESCRIPTION "The notifications emitted by the midcomMIB." ::= { midcomGroups 8 } END 8. Security Considerations Still to be completed. Very important for this module! More text here .... SNMP versions prior to SNMPv3 did not include adequate security. Even if the network itself is secure (for example by using IPSec), even then, there is no control as to who on the secure network is allowed to access and GET/SET (read/change/create/delete) the objects in this MIB module. It is REQUIRED that implementers consider the security features as provided by the SNMPv3 framework (see [RFC3410], section 8), including full support for the SNMPv3 cryptographic mechanisms (for authentication and privacy). For implementations of the MIDCOM MIB it is REQUIRED to deploy SNMPv3 and to enable cryptographic security. It is then a customer/operator responsibility to ensure that the SNMP entity giving access to an instance of this MIB module is properly configured to give access to the objects only to those principals (users) that have legitimate rights to indeed GET or SET (change/create/delete) them. 9. Acknowledgements This memo is based on a long history of discussion within the MIDCOM MIB design team. Many thanks to Mary Barnes, Wes Hardaker, David Harrington and Tom Taylor for fruitful comments and recommendations. 10. Open Issues - security considerations not complete! - firewall resource usage indication is generic. A more specific indication is required. - notification identifiers, transaction identifiers - grop lifetime: ref to semantics not appropriate - rule lifetime: ref to semantics not appropriate - means for configuring which notifications to receive - better specification of failed and rejected transactions in the MIB module (midcomTransactionsRejected and midcomTransactionsFailed) Quittek, Stiemerling, Srisuresh [Page 73] Internet-Draft MIDCOM MIB January 2004 - improve DESCRIPTION clause of midcomRscSessionId1/2 - explain use of USM and its relation to midcomSessionOwner 11. Normative References [RFC3303] Srisuresh, P., Kuthan, J., Rosenberg, J., Molitor, A. and A. Rayhan, "Middlebox communication architecture and framework", RFC 3303, August 2002. [RFC3304] Swale, R.P., Mart, P.A., Sijben, P., Brimm, S. and M. Shore, "Middlebox Communications (midcom) Protocol Requirements", RFC 3304, August 2002. [RFCXXXX] Stiemerling, M., Quittek, J. and T. Tailor, "Middlebox Communications (midcom) protocol semantics", RFC XXXX, YYYYmonth 2004, . [RFC2578] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M. and S. Waldbusser, "Structure of Management Information Version 2 (SMIv2)", STD 58, RFC 2578, April 1999. [RFC2579] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M. and S. Waldbusser, "Textual Conventions for SMIv2", STD 58, RFC 2579, April 1999. [RFC2580] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M. and S. Waldbusser, "Conformance Statements for SMIv2", STD 58, RFC 2580, April 1999. [RFC3411] Harrington, D., Presuhn, R. and B. Wijnen, "An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks", STD 62, RFC 3411, December 2002. [RFC2863] McCloghrie, K. and F. Kastenholz, "The Interfaces Group MIB", RFC 2863, June 2000. [RFC2574] Blumenthal, U., and B. Wijnen, "User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)", RFC 2574, April 1999. [RFCXXYY] Raghunarayan, R., Pai, N., Rohit, R., Wang, C. and P. Srisuresh, "Definitions of Managed Objects for Network Address Translators (NAT)", RFC XXYY, YYYYmonth 2004, . Quittek, Stiemerling, Srisuresh [Page 74] Internet-Draft MIDCOM MIB January 2004 12. Informative References [RFC3410] Case, J., Mundy, R., Partain, D. and B. Stewart, "Introduction and Applicability Statements for Internet- Standard Management Framework", RFC 3410, December 2002. [RFC3234] Carpenter, B., and Brim, S., "Middleboxes: Taxonomy and Issues", RFC 3234, February 2002. [RFC3415] B. Wijnen, R. Presuhn, K. McCloghrie, "View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)", STD 62, RFC 3415, December 2002. 13. Authors' Addresses Juergen Quittek NEC Europe Ltd. Network Laboratories Kurfuersten-Anlage 36 69115 Heidelberg Germany Phone: +49 6221 90511-15 EMail: quittek@ccrle.nec.de Martin Stiemerling NEC Europe Ltd. Network Laboratories Kurfuersten-Anlage 36 69115 Heidelberg Germany Phone: +49 6221 90511-13 Email: stiemerling@ccrle.nec.de P. Srisuresh Caymas Systems, Inc. 1179-A North McDowell Blvd. Petaluma, CA 94954 USA Phone: +1 707 283-5063 Email: srisuresh@yahoo.com Quittek, Stiemerling, Srisuresh [Page 75] Internet-Draft MIDCOM MIB January 2004 14. IPR Notices The IETF takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on the IETF's procedures with respect to rights in standards-track and standards-related documentation can be found in BCP-11. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementors or users of this specification can be obtained from the IETF Secretariat. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights which may cover technology that may be required to practice this standard. Please address the information to the IETF Executive Director. 15. Full Copyright Statement Copyright (C) The Internet Society (2004). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implmentation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Quittek, Stiemerling, Srisuresh [Page 76]