draft-ietf-storm-iscsimib-03.txt   draft-ietf-storm-iscsimib-04.txt 
INTERNET-DRAFT Mark Bakke INTERNET-DRAFT Mark Bakke
STORM Working Group Dell STORM Working Group Dell
Intended status: Proposed Standard Prakash Venkatesen Intended status: Proposed Standard Prakash Venkatesen
Expires: April 2013 HCL Technologies Expires: October 2013 HCL Technologies
Obsoletes: 4544 October 3, 2012 Obsoletes: 4544 April 2, 2013
Definitions of Managed Objects for Internet Small Computer System Definitions of Managed Objects for Internet Small Computer System
Interface (iSCSI) Interface (iSCSI)
draft-ietf-storm-iscsimib-03.txt draft-ietf-storm-iscsimib-04.txt
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
skipping to change at page 1, line 33 skipping to change at page 1, line 33
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on April 3, 2013. This Internet-Draft will expire on October 2, 2013.
Copyright Notice Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
skipping to change at page 2, line 36 skipping to change at page 2, line 36
This document obsoletes RFC4544. This document obsoletes RFC4544.
Table of Contents Table of Contents
1. The Internet-Standard Management Framework.....................3 1. The Internet-Standard Management Framework.....................3
2. Introduction...................................................3 2. Introduction...................................................3
3. Relationship to Other MIB Modules..............................3 3. Relationship to Other MIB Modules..............................3
4. Relationship to SNMP Contexts..................................4 4. Relationship to SNMP Contexts..................................4
5. Differences from RFC 4544......................................5 5. Differences from RFC 4544......................................5
6. Discussion.....................................................5 6. Discussion.....................................................5
6.1. iSCSI MIB Object Model....................................5 6.1. iSCSI MIB Object Model....................................6
6.2. iSCSI MIB Table Structure.................................6 6.2. iSCSI MIB Table Structure.................................7
6.3. iscsiInstance.............................................7 6.3. iscsiInstance.............................................8
6.4. iscsiPortal...............................................8 6.4. iscsiPortal...............................................8
6.5. iscsiTargetPortal.........................................9 6.5. iscsiTargetPortal.........................................9
6.6. iscsiInitiatorPortal......................................9 6.6. iscsiInitiatorPortal.....................................10
6.7. iscsiNode................................................10 6.7. iscsiNode................................................10
6.8. iscsiTarget..............................................11 6.8. iscsiTarget..............................................11
6.9. iscsiTgtAuthorization....................................11 6.9. iscsiTgtAuthorization....................................11
6.10. iscsiInitiator..........................................11 6.10. iscsiInitiator..........................................11
6.11. iscsiIntrAuthorization..................................11 6.11. iscsiIntrAuthorization..................................12
6.12. iscsiSession............................................11 6.12. iscsiSession............................................12
6.13. iscsiConnection.........................................12 6.13. iscsiConnection.........................................12
6.14. IP Addresses and TCP Port Numbers.......................13 6.14. IP Addresses and TCP Port Numbers.......................13
6.15. Descriptors: Using OIDs in Place of Enumerated Types....13 6.15. Descriptors: Using OIDs in Place of Enumerated Types....13
6.16. Notifications...........................................13 6.16. Notifications...........................................13
7. MIB Definition................................................14 7. MIB Definition................................................14
8. Security Considerations.......................................85 8. Security Considerations.......................................85
9. IANA Considerations...........................................86 9. IANA Considerations...........................................86
10. References...................................................86 10. References...................................................87
10.1. Normative References....................................86 10.1. Normative References....................................87
10.2. Informative References..................................87 10.2. Informative References..................................88
11. Acknowledgments..............................................88 11. Acknowledgments..............................................89
1. The Internet-Standard Management Framework 1. The Internet-Standard Management Framework
For a detailed overview of the documents that describe the current For a detailed overview of the documents that describe the current
Internet-Standard Management Framework, please refer to section 7 of Internet-Standard Management Framework, please refer to section 7 of
RFC 3410 [RFC3410]. RFC 3410 [RFC3410].
Managed objects are accessed via a virtual information store, termed Managed objects are accessed via a virtual information store, termed
the Management Information Base or MIB. MIB objects are generally the Management Information Base or MIB. MIB objects are generally
accessed through the Simple Network Management Protocol (SNMP). accessed through the Simple Network Management Protocol (SNMP).
skipping to change at page 3, line 38 skipping to change at page 3, line 38
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in "OPTIONAL" in this document are to be interpreted as described in
[RFC2119]. [RFC2119].
2. Introduction 2. Introduction
-- RFC Editor:replace cccc in RFCcccc at all the places in which it is -- RFC Editor:replace cccc in RFCcccc at all the places in which it is
-- used in this document, with the RFC number assigned to -- used in this document, with the RFC number assigned to
-- draft-ietf-storm-iscsi-cons-08 & remove this note.
This document defines a MIB module for iSCSI [RFCcccc], used to This document defines a MIB module for iSCSI [RFCcccc], used to
manage devices that implement the iSCSI protocol. It obsoletes RFC manage devices that implement the iSCSI protocol. It obsoletes RFC
4544 [RFC4544]. 4544 [RFC4544].
3. Relationship to Other MIB Modules 3. Relationship to Other MIB Modules
The iSCSI MIB module is normally layered between the SCSI MIB module The iSCSI MIB module is normally layered between the SCSI MIB module
[RFC4455] and the TCP MIB module [RFC4022], and makes use of the IP [RFC4455] and the TCP MIB module [RFC4022], and makes use of the IP
Storage (IPS) Identity Authentication MIB module [RFC4545]. Here is Storage (IPS) Identity Authentication MIB module [RFC4545]. Here is
skipping to change at page 5, line 16 skipping to change at page 5, line 16
[RFCcccc] updates several RFCs, including [RFC3720]. This document [RFCcccc] updates several RFCs, including [RFC3720]. This document
updates the iSCSI MIB correspondingly. The document uses updates the iSCSI MIB correspondingly. The document uses
iSCSIProtocolLevel as defined in [RFCssss]. It obsoletes [RFC4544]. iSCSIProtocolLevel as defined in [RFCssss]. It obsoletes [RFC4544].
Below is a brief description of the changes: Below is a brief description of the changes:
. Added iscsiInstXNodeArchitecture to InstanceAttributes . Added iscsiInstXNodeArchitecture to InstanceAttributes
. Added iscsiSsnTaskReporting of type BITS to SessionAttributes . Added iscsiSsnTaskReporting of type BITS to SessionAttributes
. Added iscsiSsnProtocolLevel to SessionAttributes . Added iscsiSsnProtocolLevel to SessionAttributes
. Deprecated the marker objects . Deprecated the marker objects
. Changed the conformance statements to match the above
. Fixed the errata to [RFC4544] . Fixed the errata to [RFC4544]
. Added NOP counters at iSCSI session scope for heartbeat tracking
. Added port number to the iscsiTgtLoginFailure and
iscsiIntrLoginFailure notifications, and to the last failure info
in iscsiInitiatorAttributesEntry
. Added description string to the iSCSI portal
. Added iscsiInstSsnTgtUnmappedErrors to support "Target Unmapped"
session failure reporting in the iscsiInstSessionFailure
notification
. Added iscsiTgtLogoutCxnClosed and iscsiTgtLogoutCxnRemoved which
maintain the count of Logout Command PDUs received by the target
with reason codes 1 and 2 respectively
. Changed the conformance statements to match the above
6. Discussion 6. Discussion
This MIB module structure supplies configuration, fault, and This MIB module structure supplies configuration, fault, and
statistics information for iSCSI devices [RFCcccc]. It is structured statistics information for iSCSI devices [RFCcccc]. It is structured
around the well-known iSCSI objects, such as targets, initiators, around the well-known iSCSI objects, such as targets, initiators,
sessions, connections, and the like. sessions, connections, and the like.
This MIB module may also be used to configure access to iSCSI This MIB module may also be used to configure access to iSCSI
targets, by creating iSCSI Portals and authorization list entries. targets, by creating iSCSI Portals and authorization list entries.
skipping to change at page 79, line 33 skipping to change at page 79, line 46
} }
STATUS current STATUS current
DESCRIPTION DESCRIPTION
"A collection of objects providing information about all "A collection of objects providing information about all
connections used by all sessions." connections used by all sessions."
::= { iscsiGroups 25 } ::= { iscsiGroups 25 }
iscsiNewObjectsV2 OBJECT-GROUP iscsiNewObjectsV2 OBJECT-GROUP
OBJECTS { OBJECTS {
iscsiInstSsnTgtUnmappedErrors, iscsiInstXNodeArchitecture,
iscsiPortalDescr, iscsiSsnTaskReporting,
iscsiSsnProtocolLevel,
iscsiSsnNopReceivedPDUs,
iscsiSsnNopSentPDUs,
iscsiIntrLastTgtFailurePort,
iscsiTgtLastIntrFailurePort, iscsiTgtLastIntrFailurePort,
iscsiPortalDescr,
iscsiInstSsnTgtUnmappedErrors,
iscsiTgtLogoutCxnClosed, iscsiTgtLogoutCxnClosed,
iscsiTgtLogoutCxnRemoved, iscsiTgtLogoutCxnRemoved
iscsiIntrLastTgtFailurePort,
iscsiSsnNopReceivedPDUs,
iscsiSsnNopSentPDUs
} }
STATUS current STATUS current
DESCRIPTION DESCRIPTION
"A collection of objects added in the second version of the "A collection of objects added in the second version of the
iSCSI MIB. This group is unconditionally optional for iSCSI MIB."
compliance to the MIB module."
::= { iscsiGroups 26 } ::= { iscsiGroups 26 }
--********************************************************************** --**********************************************************************
iscsiComplianceV1 MODULE-COMPLIANCE iscsiComplianceV1 MODULE-COMPLIANCE
STATUS deprecated STATUS deprecated
DESCRIPTION DESCRIPTION
"Initial version of compliance statement. "Initial version of compliance statement.
If an implementation can be both a target and an If an implementation can be both a target and an
skipping to change at page 85, line 6 skipping to change at page 85, line 21
GROUP iscsiInitiatorAuthGroup GROUP iscsiInitiatorAuthGroup
DESCRIPTION DESCRIPTION
"This group is mandatory for all iSCSI implementations "This group is mandatory for all iSCSI implementations
that have iSCSI initiator facilities." that have iSCSI initiator facilities."
OBJECT iscsiNodeErrorRecoveryLevel OBJECT iscsiNodeErrorRecoveryLevel
SYNTAX Unsigned32 (0..2) SYNTAX Unsigned32 (0..2)
DESCRIPTION DESCRIPTION
"Only values 0-2 are defined at present." "Only values 0-2 are defined at present."
-- Unconditionally optional groups
GROUP iscsiNewObjectsV2 GROUP iscsiNewObjectsV2
DESCRIPTION DESCRIPTION
"This group is unconditionally optional." "This group is mandatory for all iSCSI implementations
that support a value of the iSCSIProtocolLevel key of
2 or greater."
::= { iscsiCompliances 2 } ::= { iscsiCompliances 2 }
END END
8. Security Considerations 8. Security Considerations
There are a number of management objects defined in this MIB module There are a number of management objects defined in this MIB module
with a MAX-ACCESS clause of read-write and/or read-create. Such with a MAX-ACCESS clause of read-write and/or read-create. Such
objects may be considered sensitive or vulnerable in some network objects may be considered sensitive or vulnerable in some network
skipping to change at page 86, line 7 skipping to change at page 86, line 22
inappropriately advertised or discovered initiator or target does inappropriately advertised or discovered initiator or target does
not compromise their security. These issues are discussed in not compromise their security. These issues are discussed in
[RFCcccc]. [RFCcccc].
SNMP versions prior to SNMPv3 did not include adequate security. SNMP versions prior to SNMPv3 did not include adequate security.
Even if the network itself is secure (for example by using IPsec), Even if the network itself is secure (for example by using IPsec),
even then, there is no control as to who on the secure network is even then, there is no control as to who on the secure network is
allowed to access and GET/SET (read/change/create/delete) the objects allowed to access and GET/SET (read/change/create/delete) the objects
in this MIB module. in this MIB module.
It is RECOMMENDED that implementers consider the security features as Implementations SHOULD provide the security features described by the
provided by the SNMPv3 framework (see [RFC3410], section 8), SNMPv3 framework (see [RFC3410]), and implementations claiming
including full support for SNMPv3 cryptographic mechanisms (for compliance to the SNMPv3 standard MUST include full support for
authentication and privacy). authentication and privacy via the User-based Security Model (USM)
[RFC3414] with the AES cipher algorithm [RFC3826]. Implementations
MAY also provide support for the Transport Security Model (TSM)
[RFC5591] in combination with a secure transport such as SSH[RFC5592]
or TLS/DTLS [RFC6353].
Further, deployment of SNMP versions prior to SNMPv3 is NOT Further, deployment of SNMP versions prior to SNMPv3 is NOT
RECOMMENDED. Instead, it is RECOMMENDED to deploy SNMPv3 and to RECOMMENDED. Instead, it is RECOMMENDED to deploy SNMPv3 and to
enable cryptographic security. It is then a customer/operator enable cryptographic security. It is then a customer/operator
responsibility to ensure that the SNMP entity giving access to an responsibility to ensure that the SNMP entity giving access to an
instance of this MIB module is properly configured to give access to instance of this MIB module is properly configured to give access to
the objects only to those principals (users) that have legitimate the objects only to those principals (users) that have legitimate
rights to indeed GET or SET (change/create/delete) them. rights to indeed GET or SET (change/create/delete) them.
9. IANA Considerations 9. IANA Considerations
The MIB module in this document uses the following IANA-assigned The MIB module in this document uses the following IANA-assigned
OBJECT IDENTIFIER values recorded in the SMI Numbers registry: OBJECT IDENTIFIER values recorded in the SMI Numbers registry:
Descriptor OBJECT IDENTIFIER value Descriptor OBJECT IDENTIFIER value
---------- ----------------------- ---------- -----------------------
iscsiMibModule { mib-2 142 } iscsiMibModule { mib-2 142 }
RFC Editor's Note (to be removed prior to publication): this draft RFC Editor's Note (to be removed prior to publication): this draft
makes no additional requests of the IANA. makes no additional requests of the IANA. IANA is required to update
the reference for the mib-2 142 to this document.
10. References 10. References
10.1. Normative References 10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2578] McCloghrie, K., Perkins, D., and J. Schoenwaelder, [RFC2578] McCloghrie, K., Perkins, D., and J. Schoenwaelder,
"Structure of Management Information Version 2 (SMIv2)", "Structure of Management Information Version 2 (SMIv2)",
skipping to change at page 87, line 14 skipping to change at page 87, line 31
[RFC2580] McCloghrie, K., Perkins, D., and J. Schoenwaelder, [RFC2580] McCloghrie, K., Perkins, D., and J. Schoenwaelder,
"Conformance Statements for SMIv2", STD 58, RFC 2580, "Conformance Statements for SMIv2", STD 58, RFC 2580,
April 1999. April 1999.
[RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An [RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An
Architecture for Describing Simple Network Management Architecture for Describing Simple Network Management
Protocol (SNMP) Management Frameworks", STD 62, RFC 3411, Protocol (SNMP) Management Frameworks", STD 62, RFC 3411,
December 2002. December 2002.
[RFC3414] Blumenthal, U., and B. Wijnen,
"User-based Security Model (USM) for version 3 of the
Simple Network Management Protocol (SNMPv3)", RFC 3414,
December 2002.
[RFC3720] Satran, J., Meth, K., Sapuntzakis, C., Chadalapaka, M., [RFC3720] Satran, J., Meth, K., Sapuntzakis, C., Chadalapaka, M.,
and E. Zeidner, "Internet Small Computer Systems and E. Zeidner, "Internet Small Computer Systems
Interface (iSCSI)", RFC 3720, March 2004. Interface (iSCSI)", RFC 3720, March 2004.
[RFC3826] Blumenthal, U., Maino, F., and K. McCloghrie,
"The Advanced Encryption Standard (AES) Cipher
Algorithm in the SNMP User-based Security Model",
RFC 3826, June 2004.
[RFC4001] Daniele, M., Haberman, B., Routhier, S., and J. [RFC4001] Daniele, M., Haberman, B., Routhier, S., and J.
Schoenwaelder, "Textual Conventions for Internet Network Schoenwaelder, "Textual Conventions for Internet Network
Addresses", RFC 4001, February 2005. Addresses", RFC 4001, February 2005.
[RFC4545] Bakke, M. and J. Muchow, "Definitions of Managed Objects [RFC4545] Bakke, M. and J. Muchow, "Definitions of Managed Objects
for IP Storage User Identity Authorization", RFC 4545, for IP Storage User Identity Authorization", RFC 4545,
May 2006. May 2006.
[RFCcccc] Chadalapaka, M., Satran, J., and K. Meth, "iSCSI [RFC5591] Harrington, D., and W. Hardaker,
Protocol (Consolidated)", RFC cccc, mmyy "Transport Security Model for the Simple Network
Management Protocol (SNMP)", June 2009.
[RFC5592] Harrington, D., Saloway, J., and W. Hardaker,
"Secure Shell Transport Model for the Simple Network
Management Protocol (SNMP)", June 2009.
[RFC6353] W. Hardaker, "Transport Layer Security (TLS) Transport
Model for the Simple Network Management Protocol (SNMP)",
July 2011.
[RFCcccc] Chadalapaka, M., Satran, J., and K. Meth, "iSCSI
Protocol (Consolidated)", RFC cccc, mmyy.
-- RFC Editor:replace cccc with the RFC number assigned to -- RFC Editor:replace cccc with the RFC number assigned to
-- draft-ietf-storm-iscsi-cons-08 & remove this note.
-- RFC Editor:replace mmyy with the RFC month and year assigned to -- RFC Editor:replace mmyy with the RFC month and year assigned to
-- draft-ietf-storm-iscsi-cons-08 & remove this note.
[RFCssss] Knight, F., Chadalapaka, M., "Internet Small [RFCssss] Knight, F., Chadalapaka, M., "Internet Small
Computer Systems Interface (iSCSI) Update", RFC ssss, Computer Systems Interface (iSCSI) Update", RFC ssss,
mmyy mmyy.
-- RFC Editor: replace ssss with the RFC number assigned to -- RFC Editor: replace ssss with the RFC number assigned to
-- draft-ietf-storm-iscsi-sam-06 & remove this note. -- draft-ietf-storm-iscsi-sam-06 & remove this note.
-- RFC Editor: replace mmyy with the RFC month and year assigned to -- RFC Editor: replace mmyy with the RFC month and year assigned to
-- draft-ietf-storm-iscsi-sam-06 & remove this note. -- draft-ietf-storm-iscsi-sam-06 & remove this note.
10.2. Informative References 10.2. Informative References
[RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart, [RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart,
"Introduction and Applicability Statements for Internet- "Introduction and Applicability Statements for Internet-
Standard Management Framework", RFC 3410, December 2002. Standard Management Framework", RFC 3410, December 2002.
 End of changes. 26 change blocks. 
36 lines changed or deleted 79 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/