SIP-TC-MIB 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. SIP-TC-MIB DEFINITIONS ::= BEGIN
  2. IMPORTS
  3. MODULE-IDENTITY,
  4. mib-2
  5. FROM SNMPv2-SMI -- RFC 2578
  6. TEXTUAL-CONVENTION
  7. FROM SNMPv2-TC; -- RFC 2579
  8. sipTC MODULE-IDENTITY
  9. LAST-UPDATED "200704200000Z"
  10. ORGANIZATION "IETF Session Initiation Protocol Working Group"
  11. CONTACT-INFO
  12. "SIP WG email: sip@ietf.org
  13. Co-editor Kevin Lingle
  14. Cisco Systems, Inc.
  15. postal: 7025 Kit Creek Road
  16. P.O. Box 14987
  17. Research Triangle Park, NC 27709
  18. USA
  19. email: klingle@cisco.com
  20. phone: +1 919 476 2029
  21. Co-editor Joon Maeng
  22. email: jmaeng@austin.rr.com
  23. Co-editor Jean-Francois Mule
  24. CableLabs
  25. postal: 858 Coal Creek Circle
  26. Louisville, CO 80027
  27. USA
  28. email: jf.mule@cablelabs.com
  29. phone: +1 303 661 9100
  30. Co-editor Dave Walker
  31. email: drwalker@rogers.com"
  32. DESCRIPTION
  33. "Session Initiation Protocol (SIP) MIB TEXTUAL-CONVENTION
  34. module used by other SIP-related MIB Modules.
  35. Copyright (C) The IETF Trust (2007). This version of
  36. this MIB module is part of RFC 4780; see the RFC itself for
  37. full legal notices."
  38. REVISION "200704200000Z"
  39. DESCRIPTION
  40. "Initial version of the IETF SIP-TC-MIB module. This version
  41. published as part of RFC 4780."
  42. ::= { mib-2 148 }
  43. --
  44. -- Textual Conventions
  45. --
  46. SipTCTransportProtocol ::= TEXTUAL-CONVENTION
  47. STATUS current
  48. DESCRIPTION
  49. "This convention is a bit map. Each bit represents a transport
  50. protocol. If a bit has value 1, then that selected transport
  51. protocol is in some way dependent on the context of the object
  52. using this convention. If a bit has value 0, then that
  53. transport protocol is not selected. Combinations of bits can
  54. be set when multiple transport protocols are selected.
  55. bit 0: a protocol other than those defined here
  56. bit 1: User Datagram Protocol
  57. bit 2: Transmission Control Protocol
  58. bit 3: Stream Control Transmission Protocol
  59. bit 4: Transport Layer Security Protocol over TCP
  60. bit 5: Transport Layer Security Protocol over SCTP
  61. "
  62. REFERENCE "RFC 3261, Section 18 and RFC 4168"
  63. SYNTAX BITS {
  64. other(0), -- none of the following
  65. udp(1),
  66. tcp(2),
  67. sctp(3), -- RFC4168
  68. tlsTcp(4),
  69. tlsSctp(5) -- RFC 4168
  70. }
  71. SipTCEntityRole ::= TEXTUAL-CONVENTION
  72. STATUS current
  73. DESCRIPTION
  74. "This convention defines the role of a SIP entity. Examples of
  75. SIP entities are proxies, user agents, redirect servers,
  76. registrars, or combinations of the above.
  77. User Agent (UA): A logical entity that can act as both a user
  78. agent client and user agent server.
  79. User Agent Client (UAC): A logical entity that creates a new
  80. request, and then uses the client transaction state machinery
  81. to send it. The role of UAC lasts only for the duration of
  82. that transaction. In other words, if a piece of software
  83. initiates a request, it acts as a UAC for the duration of that
  84. transaction. If it receives a request later, it assumes the
  85. role of a user agent server for the processing of that
  86. transaction.
  87. User Agent Server (UAS): A logical entity that generates a
  88. response to a SIP request. The response accepts, rejects,
  89. or redirects the request. This role lasts only for the
  90. duration of that transaction. In other words, if a piece of
  91. software responds to a request, it acts as a UAS for the
  92. duration of that transaction. If it generates a request
  93. later, it assumes the role of a user agent client for the
  94. processing of that transaction.
  95. Proxy, Proxy Server: An intermediary entity that acts as both
  96. a server and a client for the purpose of making requests on
  97. behalf of other clients. A proxy server primarily plays the
  98. role of routing, which means its job is to ensure that a
  99. request is sent to another entity 'closer' to the targeted
  100. user. Proxies are also useful for enforcing policy. A proxy
  101. interprets and, if necessary, rewrites specific parts of a
  102. request message before forwarding it.
  103. Redirect Server: A redirect server is a user agent server that
  104. generates 3xx responses to requests it receives, directing the
  105. client to contact an alternate set of URIs.
  106. Registrar: A registrar is a server that accepts REGISTER
  107. requests and places the information it receives in those
  108. requests into the location service for the domain it handles."
  109. REFERENCE
  110. "RFC 3261, Section 6"
  111. SYNTAX BITS {
  112. other(0),
  113. userAgent(1),
  114. proxyServer(2),
  115. redirectServer(3),
  116. registrarServer(4)
  117. }
  118. SipTCOptionTagHeaders ::= TEXTUAL-CONVENTION
  119. STATUS current
  120. DESCRIPTION
  121. "This convention defines the header fields that use the option
  122. tags per Section 19.2 of RFC 3261. These tags are used in
  123. Require (Section 20.32), Proxy-Require (Section 20.29),
  124. Supported (Section 20.37), and Unsupported (Section 20.40)
  125. header fields."
  126. REFERENCE
  127. "RFC 3261, Sections 19.2, 20.32, 20.29, 20.37, and 20.40"
  128. SYNTAX BITS {
  129. require(0), -- Require header
  130. proxyRequire(1), -- Proxy-Require header
  131. supported(2), -- Supported header
  132. unsupported(3) -- Unsupported header
  133. }
  134. SipTCMethodName ::= TEXTUAL-CONVENTION
  135. STATUS current
  136. DESCRIPTION
  137. "This TEXTUAL-CONVENTION is a string that uniquely identifies a
  138. SIP method. The scope of uniqueness is the context of all
  139. defined SIP methods.
  140. Experimental support of extension methods is acceptable and
  141. expected. Extension methods are those defined in
  142. officially sanctioned by IANA.
  143. To support experimental extension methods, any object using
  144. this TEXTUAL-CONVENTION as syntax MAY return/accept a method
  145. identifier value other than those sanctioned by IANA. That
  146. system MUST ensure no collisions with officially assigned
  147. method names."
  148. REFERENCE
  149. "RFC 3261, Section 27.4"
  150. SYNTAX OCTET STRING (SIZE (1..100))
  151. END