draft-ietf-bridge-ext-v2-01.txt   draft-ietf-bridge-ext-v2-02.txt 
Internet Draft Editor of this version: Internet Draft Editor of this version:
Expires February 2003 V. Ngai Expires August 2004 V. Ngai
draft-ietf-bridge-ext-v2-01.txt Enterasys Networks draft-ietf-bridge-ext-v2-02.txt Enterasys Networks
Authors of previous version: Authors of previous version:
E. Bell E. Bell
3Com Corp. 3Com Corp.
A. Smith A. Smith
Extreme Networks Beijing Harbour Networks
P. Langille P. Langille
Newbridge Networks Newbridge Networks
A. Rijhsinghani A. Rijhsinghani
Enterasys Networks Enterasys Networks
K. McCloghrie K. McCloghrie
Cisco Systems Cisco Systems
September 2002 March 2004
Definitions of Managed Objects for Bridges with Traffic Definitions of Managed Objects for Bridges with Traffic
Classes, Multicast Filtering and Virtual LAN Extensions Classes, Multicast Filtering and Virtual LAN Extensions
Status of this Memo Status of this Memo
This document is an Internet-Draft and is subject to all provisions This document is an Internet-Draft and is subject to all provisions
of Section 10 of RFC2026. Internet-Drafts are working documents of of Section 10 of RFC2026. Internet-Drafts are working documents of
the Internet Engineering Task Force (IETF), its areas, and its the Internet Engineering Task Force (IETF), its areas, and its
working groups. Note that other groups may also distribute working working groups. Note that other groups may also distribute working
skipping to change at page 1, line 43 skipping to change at page 1, line 43
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (1999). All Rights Reserved. Copyright (C) The Internet Society (2004). All Rights Reserved.
Abstract Abstract
This memo defines a portion of the Management Information Base (MIB) This memo defines a portion of the Management Information Base (MIB)
for use with network management protocols in TCP/IP based internets. for use with network management protocols in TCP/IP based internets.
In particular, it defines two MIB modules for managing the new In particular, it defines two MIB modules for managing the new
capabilities of MAC bridges defined by the IEEE 802.1D-1998 MAC capabilities of MAC bridges defined by the IEEE 802.1D-1998 MAC
Bridges and the IEEE 802.1Q-1998 Virtual LAN (VLAN) standards for Bridges and the IEEE 802.1Q-1998 Virtual LAN (VLAN) standards for
bridging between Local Area Network (LAN) segments. One MIB module bridging between Local Area Network (LAN) segments. One MIB module
defines objects for managing the 'Traffic Classes' and 'Enhanced defines objects for managing the 'Traffic Classes' and 'Enhanced
skipping to change at page 2, line 47 skipping to change at page 2, line 47
3.1.5 The dot1dGarp Group ......................................... 8 3.1.5 The dot1dGarp Group ......................................... 8
3.1.6 The dot1dGmrp Group ......................................... 9 3.1.6 The dot1dGmrp Group ......................................... 9
3.1.7 The dot1dTpHCPortTable ...................................... 9 3.1.7 The dot1dTpHCPortTable ...................................... 9
3.1.8 The dot1dTpPortOverflowTable ................................ 9 3.1.8 The dot1dTpPortOverflowTable ................................ 9
3.2 Structure of Virtual Bridge MIB module ........................ 9 3.2 Structure of Virtual Bridge MIB module ........................ 9
3.2.1 Relationship to IEEE 802.1Q Manageable Objects .............. 9 3.2.1 Relationship to IEEE 802.1Q Manageable Objects .............. 9
3.2.2 The dot1qBase Group .........................................13 3.2.2 The dot1qBase Group .........................................13
3.2.3 The dot1qTp Group ...........................................13 3.2.3 The dot1qTp Group ...........................................13
3.2.4 The dot1qStatic Group .......................................13 3.2.4 The dot1qStatic Group .......................................13
3.2.5 The dot1qVlan Group .........................................13 3.2.5 The dot1qVlan Group .........................................13
3.3 Textual Conventions ...........................................13 3.3 Textual Conventions ...........................................14
3.4 Relationship to Other MIBs ....................................14 3.4 Relationship to Other MIBs ....................................14
3.4.1 Relationship to the 'system' group ..........................14 3.4.1 Relationship to the 'system' group ..........................14
3.4.2 Relation to Interfaces MIB ..................................14 3.4.2 Relation to Interfaces MIB ..................................14
3.4.2.1 Layering Model ............................................15 3.4.2.1 Layering Model ............................................15
3.4.2.2 ifStackTable ..............................................16 3.4.2.2 ifStackTable ..............................................16
3.4.2.3 ifRcvAddressTable .........................................16 3.4.2.3 ifRcvAddressTable .........................................16
3.4.3 Relation to Original Bridge MIB .............................16 3.4.3 Relation to Original Bridge MIB .............................16
3.4.3.1 The dot1dBase Group .......................................16 3.4.3.1 The dot1dBase Group .......................................17
3.4.3.2 The dot1dStp Group ........................................17 3.4.3.2 The dot1dStp Group ........................................17
3.4.3.3 The dot1dTp Group .........................................17 3.4.3.3 The dot1dTp Group .........................................17
3.4.3.4 The dot1dStatic Group .....................................17 3.4.3.4 The dot1dStatic Group .....................................18
3.4.3.5 Additions to the Original Bridge MIB ......................18 3.4.3.5 Additions to the Original Bridge MIB ......................18
4 Definitions for Extended Bridge MIB .............................18 4 Definitions for Extended Bridge MIB .............................19
5 Definitions for Virtual Bridge MIB ..............................38 5 Definitions for Virtual Bridge MIB ..............................38
6 Acknowledgments .................................................80 6 Acknowledgments .................................................81
7 Security Considerations .........................................80 7 Security Considerations .........................................81
8 References ......................................................81 8 References ......................................................82
9 Authors' Addresses ..............................................84 9 Authors' Addresses ..............................................85
10 Intellectual Property ..........................................86 10 Intellectual Property ..........................................87
11 Full Copyright Statement .......................................87 11 Full Copyright Statement .......................................88
1. The SNMP Management Framework 1. The SNMP Management Framework
The SNMP Management Framework presently consists of five major The SNMP Management Framework presently consists of five major
components: components:
o An overall architecture, described in RFC 2571 [RFC2571]. o An overall architecture, described in RFC 2571 [RFC2571].
o Mechanisms for describing and naming objects and events for the o Mechanisms for describing and naming objects and events for the
purpose of management. The first version of this Structure of purpose of management. The first version of this Structure of
skipping to change at page 85, line 13 skipping to change at page 85, line 13
1213, March 1991. 1213, March 1991.
9. Authors' Addresses 9. Authors' Addresses
Vivian Ngai Vivian Ngai
Enterasys Networks Enterasys Networks
2691 South Decker Lake Lane 2691 South Decker Lake Lane
Salt lake City, UT 84119 Salt lake City, UT 84119
USA USA
Phone: +1 801-887-9802 Phone: +1 801 556 5652
Fax: +1 801-972-5789 Email: vivian_ngai@acm.org
Email: vngai@enterasys.com
Les Bell Les Bell
3Com Europe Limited 3Com Europe Limited
3Com Centre, Boundary Way 3Com Centre, Boundary Way
Hemel Hempstead Hemel Hempstead
Herts. HP2 7YU Herts. HP2 7YU
UK UK
Phone: +44 1442 438025 Phone: +44 1442 438025
EMail: Les_Bell@3Com.com EMail: Les_Bell@3Com.com
skipping to change at page 88, line 7 skipping to change at page 88, line 7
be obtained from the IETF Secretariat. be obtained from the IETF Secretariat.
The IETF invites any interested party to bring to its attention any The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary copyrights, patents or patent applications, or other proprietary
rights which may cover technology that may be required to practice rights which may cover technology that may be required to practice
this standard. Please address the information to the IETF Executive this standard. Please address the information to the IETF Executive
Director. Director.
11. Full Copyright Statement 11. Full Copyright Statement
Copyright (C) The Internet Society (1999). All Rights Reserved. Copyright (C) The Internet Society (2004). All Rights Reserved.
This document and translations of it may be copied and furnished to This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of Internet organizations, except as needed for the purpose of
 End of changes. 

This html diff was produced by rfcdiff 1.23, available from http://www.levkowetz.com/ietf/tools/rfcdiff/