tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

RFC 4706

 
 
 

Definitions of Managed Objects for Asymmetric Digital Subscriber Line 2 (ADSL2)

Part 7 of 7, p. 155 to 167
Prev RFC Part

 


prevText      Top      Up      ToC       Page 155 
4.  Implementation Analysis

   A management application intended to manage ADSL links (e.g.,
   G.992.1) with this MIB module must be modified to adapt itself to
   certain differences between RFC 2662 [RFC2662] and this MIB module,
   including the following aspects:

   o  Although the configuration templates/profiles allow referring to
      1-4 bearer channels, ADSL links are limited to 2 channels at most.

   o  Although the channel configuration profile allows higher data
      rates, ADSL links are limited to downstream/upstream data rates as
      assumed in RFC 2662 [RFC2662].

   o  The Impulse Noise Protection (INP) configuration parameters are
      given by minimum protection and maximum delay parameters.

   o  The line configuration profile includes a sub-table that addresses
      mode-specific parameters.  For ADSL links, the management
      application SHOULD create a row in that table for the 'adsl' mode.

   o  The line configuration profile includes parameters that are
      irrelevant for ADSL links.  Similarly, many status parameters in
      the MIB are irrelevant for certain ADSL modes.  Therefore, it is
      advised to consult with ITU G.997.1 standard [G.997.1] regarding
      the scope and relevance of each parameter in this MIB.

5.  Security Considerations

   There are a number of management objects defined in this MIB module
   with a MAX-ACCESS clause of read-write and/or read-create.  Such
   objects may be considered sensitive or vulnerable in some network
   environments.  The support for SET operations in a non-secure
   environment without proper protection can have a negative effect on
   network operations.  These are the tables and objects and their
   sensitivity/vulnerability:

   o  adsl2LineTable

      The table consists of the following objects that support SET
      operations:

      *  adsl2LineCnfgTemplate
      *  adsl2LineAlarmCnfgTemplate
      *  adsl2LineCmndConfPmsf
      *  adsl2LineCmndConfLdsf
      *  adsl2LineCmndAutomodeColdStart

Top      Up      ToC       Page 156 
      Unauthorized changes to adsl2LineCnfgTemplate could have a major
      adverse operational effect on many lines simultaneously.

      Unauthorized changes to adsl2LineAlarmCnfgTemplate could have a
      contrary effect on notifications.

      Unauthorized changes to adsl2LineCmndConfPmsf could have an
      adverse affect on the power consumption of a line and may disrupt
      an operational service.

      Unauthorized changes to adsl2LineCmndConfLdsf could cause an
      unscheduled line test to be carried out on the line.

      Unauthorized changes to adsl2LineCmndAutomodeColdStart could cause
      an unscheduled cold reset to the line.

   o  adsl2SCStatusTable

      This table contains one object, adsl2SCStatusRowStatus, that
      supports SET operations.  Unauthorized changes could result in
      line test results being deleted prematurely.

   o  adsl2LineConfTemplateTable

      The table consists of the following objects that support SET
      operations:

      *  adsl2LConfTempLineProfile
      *  adsl2LConfTempChan1ConfProfile
      *  adsl2LConfTempChan1RaRatioDs
      *  adsl2LConfTempChan1RaRatioUs
      *  adsl2LConfTempChan2ConfProfile
      *  adsl2LConfTempChan2RaRatioDs
      *  adsl2LConfTempChan2RaRatioUs
      *  adsl2LConfTempChan3ConfProfile
      *  adsl2LConfTempChan3RaRatioDs
      *  adsl2LConfTempChan3RaRatioUs
      *  adsl2LConfTempChan4ConfProfile
      *  adsl2LConfTempChan4RaRatioDs
      *  adsl2LConfTempChan4RaRatioUs
      *  adsl2LConfTempRowStatus

      Unauthorized changes to adsl2LConfTempLineProfile,
      adsl2LConfTempChan1ConfProfile, adsl2LConfTempChan2ConfProfile,
      adsl2LConfTempChan3ConfProfile, or adsl2LConfTempChan4ConfProfile
      could have an adverse operational effect on several lines; could

Top      Up      ToC       Page 157 
      change several lines over to running in unwanted levels of
      operation; or could result in several services undergoing changes
      in the number of channels that carry the service.

      Unauthorized changes to adsl2LConfTempChan1RaRatioDs,
      adsl2LConfTempChan2RaRatioDs, adsl2LConfTempChan3RaRatioDs, or
      adsl2LConfTempChan4RaRatioDs, would alter the relative rate
      allocations among all channels belonging to a line.  This could
      have an adverse operational effect on several lines.

      Unauthorized changes to adsl2LConfTempRowStatus could result in
      templates being created or brought into service prematurely; or
      could result in templates being inadvertently deleted or taken out
      of service.

   o  adsl2LineConfProfTable

      The table consists of the following objects that support SET
      operations:

      *  adsl2LConfProfScMaskDs
      *  adsl2LConfProfScMaskUs
      *  adsl2LConfProfRfiBandsDs
      *  adsl2LConfProfRaModeDs
      *  adsl2LConfProfRaModeUs
      *  adsl2LConfProfRaUsNrmDs
      *  adsl2LConfProfRaUsNrmUs
      *  adsl2LConfProfRaUsTimeDs
      *  adsl2LConfProfRaUsTimeUs
      *  adsl2LConfProfRaDsNrmsDs
      *  adsl2LConfProfRaDsNrmsUs
      *  adsl2LConfProfRaDsTimeDs
      *  adsl2LConfProfRaDsTimeUs
      *  adsl2LConfProfTargetSnrmDs
      *  adsl2LConfProfTargetSnrmUs
      *  adsl2LConfProfMaxSnrmDs
      *  adsl2LConfProfMaxSnrmUs
      *  adsl2LConfProfMinSnrmDs
      *  adsl2LConfProfMinSnrmUs
      *  adsl2LConfProfMsgMinUs
      *  adsl2LConfProfMsgMinDs
      *  adsl2LConfProfAtuTransSysEna
      *  adsl2LConfProfPmMode
      *  adsl2LConfProfL0Time
      *  adsl2LConfProfL2Time
      *  adsl2LConfProfL2Atpr
      *  adsl2LConfProfL2Atprt
      *  adsl2LConfProfRowStatus

Top      Up      ToC       Page 158 
      Unauthorized changes resulting in the setting of any of the above
      objects to an incorrect value could have an adverse operational
      effect on several lines.

      Also, unauthorized changes to adsl2LConfProfRowStatus could result
      in unwanted line profiles being created or brought into service
      prematurely; or could result in line profiles being inadvertently
      deleted or taken out of service.

   o  adsl2LineConfProfModeSpecTable

      The table consists of the following objects that support SET
      operations:

      *  adsl2LConfProfMaxNomPsdDs
      *  adsl2LConfProfMaxNomPsdUs
      *  adsl2LConfProfMaxNomAtpDs
      *  adsl2LConfProfMaxNomAtpUs
      *  adsl2LConfProfMaxAggRxPwrUs
      *  adsl2LConfProfPsdMaskDs
      *  adsl2LConfProfPsdMaskUs
      *  adsl2LConfProfPsdMaskSelectUs
      *  adsl2LConfProfModeSpecRowStatus

      Unauthorized changes resulting in the setting of any of the above
      objects to an incorrect value could have an adverse operational
      effect on several lines.

      Also, unauthorized changes to adsl2LConfProfModeSpecRowStatus
      could result in unwanted PSD configurations being created or
      brought into service prematurely; or could result in PSD
      configurations being inadvertently deleted or taken out of
      service.

   o  adsl2ChConfProfileTable

      The table consists of the following objects that support SET
      operations:

      *  adsl2ChConfProfMinDataRateDs
      *  adsl2ChConfProfMinDataRateUs
      *  adsl2ChConfProfMinResDataRateDs
      *  adsl2ChConfProfMinResDataRateUs
      *  adsl2ChConfProfMaxDataRateDs
      *  adsl2ChConfProfMaxDataRateUs
      *  adsl2ChConfProfMinDataRateLowPwrDs
      *  adsl2ChConfProfMaxDelayDs
      *  adsl2ChConfProfMaxDelayUs

Top      Up      ToC       Page 159 
      *  adsl2ChConfProfMinProtectionDs
      *  adsl2ChConfProfMinProtectionUs
      *  adsl2ChConfProfMaxBerDs
      *  adsl2ChConfProfMaxBerUs
      *  adsl2ChConfProfUsDataRateDs
      *  adsl2ChConfProfDsDataRateDs
      *  adsl2ChConfProfUsDataRateUs
      *  adsl2ChConfProfDsDataRateUs
      *  adsl2ChConfProfImaEnabled
      *  adsl2ChConfProfRowStatus

      Unauthorized changes resulting in the setting of any of the above
      objects to an incorrect value could have an adverse operational
      effect on several lines.

      Also, unauthorized changes to adsl2ChConfProfRowStatus could
      result in unwanted channel profiles being created or brought into
      service prematurely; or could result in channel profiles being
      inadvertently deleted or taken out of service.

   o  adsl2LineAlarmConfTemplateTable

      The table consists of the following objects that support SET
      operations:

      *  adsl2LAlarmConfTempLineProfile
      *  adsl2LAlarmConfTempChan1ConfProfile
      *  adsl2LalarmConfTempChan2ConfProfile
      *  adsl2LalarmConfTempChan3ConfProfile
      *  adsl2LalarmConfTempChan4ConfProfile
      *  adsl2LAlarmConfTempRowStatus

      Unauthorized changes to adsl2LAlarmConfTempLineProfile,
      adsl2LAlarmConfTempChan1ConfProfile,
      adsl2LAlarmConfTempChan2ConfProfile,
      adsl2LAlarmConfTempChan3ConfProfile, or
      adsl2LAlarmConfTempChan4ConfProfile could have an adverse effect
      on the management of notifications generated at the scope of
      several to many lines; or could change several to many lines over
      to running with unwanted management rates for generated
      notifications.

      Unauthorized changes to adsl2LAlarmConfTempRowStatus could result
      in alarm templates being created or brought into service
      prematurely; or could result in alarm templates being
      inadvertently deleted or taken out of service.

Top      Up      ToC       Page 160 
   o  adsl2LineAlarmConfProfileTable

      The table consists of the following objects that support SET
      operations:

      *  adsl2LineAlarmConfProfileAtucThresh15MinFecs
      *  adsl2LineAlarmConfProfileAtucThresh15MinEs
      *  adsl2LineAlarmConfProfileAtucThresh15MinSes
      *  adsl2LineAlarmConfProfileAtucThresh15MinLoss
      *  adsl2LineAlarmConfProfileAtucThresh15MinUas
      *  adsl2LineAlarmConfProfileAturThresh15MinFecs
      *  adsl2LineAlarmConfProfileAturThresh15MinEs
      *  adsl2LineAlarmConfProfileAturThresh15MinSes
      *  adsl2LineAlarmConfProfileAturThresh15MinLoss
      *  adsl2LineAlarmConfProfileAturThresh15MinUas
      *  adsl2LineAlarmConfProfileThresh15MinFailedFullInt
      *  adsl2LineAlarmConfProfileThresh15MinFailedShrtInt
      *  adsl2LineAlarmConfProfileRowStatus

         Increasing any of the threshold values could result in a
         notification being suppressed or deferred.  Setting a threshold
         to 0 could result in a notification being suppressed.
         Suppressing or deferring a notification could prevent the
         timely delivery of important diagnostic information.
         Decreasing any of the threshold values could result in a
         notification being sent from the network falsely reporting a
         threshold crossing.

         Changing a threshold value could also have an impact on the
         amount of notifications the agent sends.  The Notifications
         Section of this document has a paragraph that provides general
         guidance on the rate-limiting of notifications.  Agent
         implementations not providing rate-limiting could result in
         notifications being generated at an uncontrolled rate.
         Unauthorized changes to a threshold value could result in an
         undesired notification rate.

         Unauthorized changes to row status could result in unwanted
         line alarm profiles being created or brought into service.
         Also, changes to the row status could result in line alarm
         profiles being inadvertently deleted or taken out of service.

   o  adsl2ChAlarmConfProfileTable

         The table consists of the following objects that support SET
         operations:

Top      Up      ToC       Page 161 
      *  adsl2ChAlarmConfProfileAtucThresh15MinCodingViolations
      *  adsl2ChAlarmConfProfileAtucThresh15MinCorrected
      *  adsl2ChAlarmConfProfileAturThresh15MinCodingViolations
      *  adsl2ChAlarmConfProfileAturThresh15MinCorrected
      *  adsl2ChAlarmConfProfileRowStatus
      *  adsl2LineAlarmConfProfileAturThresh15MinFecs
      *  adsl2LineAlarmConfProfileAturThresh15MinEs
      *  adsl2LineAlarmConfProfileAturThresh15MinSes
      *  adsl2LineAlarmConfProfileAturThresh15MinLoss
      *  adsl2LineAlarmConfProfileAturThresh15MinUas
      *  adsl2LineAlarmConfProfileThresh15MinFailedFullInt
      *  adsl2LineAlarmConfProfileThresh15MinFailedShrtInt
      *  adsl2LineAlarmConfProfileRowStatus

         Increasing any of the threshold values could result in a
         notification being suppressed or deferred.  Setting a threshold
         to 0 could result in a notification being suppressed.
         Suppressing or deferring a notification could prevent the
         timely delivery of important diagnostic information.
         Decreasing any of the threshold values could result in a
         notification being sent from the network falsely reporting a
         threshold crossing.

         Changing a threshold value could also have an impact on the
         amount of notifications the agent sends.  The Notifications
         Section of this document has a paragraph that provides general
         guidance on the rate-limiting of notifications.  Agent
         implementations not providing rate-limiting could result in
         notifications being generated at an uncontrolled rate.
         Unauthorized changes to a threshold value could result in an
         undesired notification rate.

         Unauthorized changes to row status could result in unwanted
         channel alarm profiles being created or brought into service.
         Also, changes to the row status could result in channel alarm
         profiles being inadvertently deleted or taken out of service.

   Some of the readable objects in this MIB module (i.e., objects with a
   MAX-ACCESS other than not-accessible) may be considered sensitive or
   vulnerable in some network environments.  It is thus important to
   control even GET and/or NOTIFY access to these objects and possibly
   to even encrypt the values of these objects when sending them over
   the network via SNMP.  These are the tables and objects and their
   sensitivity/vulnerability:

Top      Up      ToC       Page 162 
   o  adsl2LineInventoryTable

      Access to these objects would allow an intruder to obtain
      information about which vendor's equipment is in use on the
      network.  Further, such information is considered sensitive in
      many environments for competitive reasons.

      *  adsl2LInvG994VendorId
      *  adsl2LInvSystemVendorId
      *  adsl2LInvVersionNumber
      *  adsl2LInvSerialNumber
      *  adsl2LInvSelfTestResult
      *  adsl2LInvTransmissionCapabilities

   SNMP versions prior to SNMPv3 did not include adequate security.
   Even if the network itself is secure (for example by using IPSec),
   even then, there is no control as to who on the secure network is
   allowed to access and GET/SET (read/change/create/delete) the objects
   in this MIB module.

   It is RECOMMENDED that implementers consider the security features as
   provided by the SNMPv3 framework (see [RFC3410], Section 8),
   including full support for the SNMPv3 cryptographic mechanisms (for
   authentication and privacy).

   It is RECOMMENDED to deploy SNMPv3 and to enable cryptographic
   security.  It is then a customer/operator responsibility to ensure
   that the SNMP entity giving access to an instance of this MIB module
   is properly configured to give access only to those objects whose
   principals (users) have legitimate rights to indeed GET or SET
   (change/create/delete) them.

Top      Up      ToC       Page 163 
6.  Acknowledgements

   The authors are deeply grateful to the authors of the HDSL2 LINE MIB
   (RFC 4319), Clay Sikes and Bob Ray, for contributing to accelerating
   the work on this document.  The structure of this document as well as
   several paragraphs originate in their document.

   Special thanks to Bert Wijnen for his meticulous review of this text.

   Other contributions and advice were received from the following:

             Bert Wijnen       (Lucent)
             Bob Ray           (Pesa)
             Chen Jian         (Huawei)
             Clay Sikes        (Zhone)
             Mauro Molinari    (Marconi)
             Narendranath Nair (Wipro)
             Randy Presuhn     (Mindspring)
             Veena Naidu       (Wipro)

7.  References

7.1.  Normative References

   [G.992.1]      "Asymmetric digital subscriber line (ADSL)
                  transceivers", ITU-T G.992.1, 1999.

   [G.992.2]      "Splitterless asymmetric digital subscriber line
                  (ADSL) transceivers", ITU-T G.992.2, 1999.

   [G.992.3]      "Asymmetric digital subscriber line transceivers 2
                  (ADSL2)", ITU-T G.992.3, 2002.

   [G.992.4]      "Splitterless asymmetric digital subscriber line
                  transceivers 2 (Splitterless ADSL2)", ITU-T G.992.4,
                  2002.

   [G.992.5]      "Asymmetric digital subscriber line (ADSL)
                  transceivers - Extended bandwidth ADSL2 (ADSL2+)",
                  ITU-T G.992.5, 2003.

   [G.993.2]      "Very-high speed Digital Subscriber Line Transceivers
                  2 (VDSL2 draft)", ITU-T G.993.2, July 2005.

   [G.997.1]      "Physical layer management for digital subscriber line
                  (DSL) transceivers", ITU-T G.997.1, May 2003.

Top      Up      ToC       Page 164 
   [G.997.1am1]   "Physical layer management for digital subscriber line
                  (DSL) transceivers Amendment 1", ITU-T G.997.1
                  Amendment 1, December 2003.

   [G.997.1am2]   "Physical layer management for digital subscriber line
                  (DSL) transceivers Amendment 2", ITU-T G.997.1
                  Amendment 2, January 2005.

   [RFC2119]      Bradner, S., "Key words for use in RFCs to Indicate
                  Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2578]      McCloghrie, K., Ed., Perkins, D., Ed., and J.
                  Schoenwaelder, Ed., "Structure of Management
                  Information Version 2 (SMIv2)", STD 58, RFC 2578,
                  April 1999.

   [RFC2579]      McCloghrie, K., Ed., Perkins, D., Ed., and J.
                  Schoenwaelder, Ed., "Textual Conventions for SMIv2",
                  STD 58, RFC 2579, April 1999.

   [RFC2580]      McCloghrie, K., Perkins, D., and J. Schoenwaelder,
                  "Conformance Statements for SMIv2", STD 58, RFC 2580,
                  April 1999.

   [RFC2863]      McCloghrie, K. and F. Kastenholz, "The Interfaces
                  Group MIB", RFC 2863, June 2000.

   [RFC3411]      Harrington, D., Presuhn, R., and B. Wijnen, "An
                  Architecture for Describing Simple Network Management
                  Protocol (SNMP) Management Frameworks", STD 62,
                  RFC 3411, December 2002.

   [RFC3593]      Tesink, K., "Textual Conventions for MIB Modules Using
                  Performance History Based on 15 Minute Intervals",
                  RFC 3593, September 2003.

   [RFC3705]      Ray, B. and R. Abbi, "High Capacity Textual
                  Conventions for MIB Modules Using Performance History
                  Based on 15 Minute Intervals", RFC 3705, February
                  2004.

   [T1E1.413]     J. Bingham & F. Van der Putten, "Network and Customer
                  Installation Interfaces - Asymmetric Digital
                  Subscriber Line (ADSL) Metallic Interface. (T1.413
                  Issue 2)", ANSI T1E1.413-1998, June 1998.

Top      Up      ToC       Page 165 
   [TR-90]        Abbi, R., "Protocol Independent Object Model for
                  Managing Next Generation ADSL Technologies", DSL Forum
                  TR-90, December 2004.

7.2.  Informative References

   [RFC2662]      Bathrick, G. and F. Ly, "Definitions of Managed
                  Objects for the ADSL Lines", RFC 2662, August 1999.

   [RFC3410]      Case, J., Mundy, R., Partain, D., and B. Stewart,
                  "Introduction and Applicability Statements for
                  Internet-Standard Management Framework", RFC 3410,
                  December 2002.

   [RFC3418]      Presuhn, R., "Management Information Base (MIB) for
                  the Simple Network Management Protocol (SNMP)",
                  STD 62, RFC 3418, December 2002.

Top      Up      ToC       Page 166 
Authors' Addresses

   Moti Morgenstern
   ECI Telecom Ltd.
   30 Hasivim St.
   Petach Tikva  49517
   Israel

   Phone: +972 3 926 6258
   Fax:   +972 3 928 7342
   EMail: moti.Morgenstern@ecitele.com


   Menachem Dodge
   ECI Telecom Ltd.
   30 Hasivim St.
   Petach Tikva  49517
   Israel

   Phone: +972 3 926 8421
   Fax:   +972 3 928 7342
   EMail: mbdodge@ieee.org


   Scott Baillie
   NEC Australia
   649-655 Springvale Road
   Mulgrave, Victoria  3170
   Australia

   Phone: +61 3 9264 3986
   Fax:   +61 3 9264 3892
   EMail: scott.baillie@nec.com.au


   Umberto Bonollo
   NEC Australia
   649-655 Springvale Road
   Mulgrave, Victoria  3170
   Australia

   Phone: +61 3 9264 3385
   Fax:   +61 3 9264 3892
   EMail: umberto.bonollo@nec.com.au

Top      Up      ToC       Page 167 
Full Copyright Statement

   Copyright (C) The Internet Society (2006).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.

Acknowledgement

   Funding for the RFC Editor function is provided by the IETF
   Administrative Support Activity (IASA).