Differences in Derived Data Types of

Managed Object Model for virtual MRF

Managed Information Model (MIM) identity
     Name   : MrfMOM
     Version : 2
     Release : 5
     Correction : 0
    

Compared to

MergedModel


Managed Information Model (MIM) identity
     Name   : MrfMOM
     Version : 2
     Release : 4
     Correction : 0
    

 

Contents

derivedDataType ComSnmp_HostAndPort_port new
derivedDataType ComSnmp_SnmpTargetV1_networkPrefixLength new
derivedDataType ComSnmp_SnmpTargetV1_port new
derivedDataType ComSnmp_SnmpTargetV2C_networkPrefixLength new
derivedDataType ComSnmp_SnmpTargetV2C_port new
derivedDataType ComSnmp_SnmpTargetV3_port new
derivedDataType ComSnmp_SnmpTargetV3Dtls_port new
derivedDataType ActionInvocationResult changed
derivedDataType ActionInvocationResult changed
derivedDataType CipherList changed
derivedDataType DateTime changed
derivedDataType DateTime changed
derivedDataType DateTime changed
derivedDataType DateTimeWithoutOffset changed
derivedDataType DateTimeWithoutOffset changed
derivedDataType DifferenceFromUTC changed
derivedDataType DistinguishedName changed
derivedDataType EcimEmpty changed
derivedDataType EcimEmpty changed
derivedDataType EcimEmpty changed
derivedDataType IPAddress changed
derivedDataType IpDNSAddress changed
derivedDataType IpDNSAddress changed
derivedDataType LdapDistinguishedName changed
derivedDataType SecSecM_UserManagement_targetType changed
derivedDataType SnmpOid changed
 

 
derivedDataType ComSnmp_HostAndPort_port
derivedDataType ComSnmp_SnmpTargetV1_networkPrefixLength
derivedDataType ComSnmp_SnmpTargetV1_port
derivedDataType ComSnmp_SnmpTargetV2C_networkPrefixLength
derivedDataType ComSnmp_SnmpTargetV2C_port
derivedDataType ComSnmp_SnmpTargetV3_port
derivedDataType ComSnmp_SnmpTargetV3Dtls_port
derivedDataType ActionInvocationResult
domainExtension

derivedDataType ActionInvocationResult
domainExtension
old:  
new:  

derivedDataType CipherList
description
  Derived string for the specification of a cipher suite list.

Contains colon-delimited (':') cipher strings that can be of any value of the members contained by a Cipher struct. A cipher string indicates an individual cipher or a set of ciphers that use the same protocol version, key exchange etc. The cipher strings can be combined in logical order and operation by character '+'. They can be optionally preceded by either an '!' or a '-' character. Character '!' means that the preceded cipher suite or cipher suite type is permanently deleted from the list. Character '-' means that the preceded cipher suite or cipher suite type is deleted from the list, but any of the cipher suites can be added by later options.

They must contain at least one positive expression, that is, without character '!' or '-' in the cipher string, otherwise the filter results in an empty cipher suite list.

Cipher strings with special meaning:
ALL - all cipher suites except for the NULL encryption ciphers, which must be explicitly enabled. NULL authentication ciphers are included.
DEFAULT - all cipher suites except the NULL authentication and NULL encryption ciphers.

Example:

ALL:!SSLv2:!RSA:!aRSA:!3DES:!DES:!MD5 ALL:!EXP-EDH-RSA-DES-CBC-SHA AES:-kRSA AES:RC4 kEDH+EXPORT:-MD5
ALL:!EXP-EDH-RSA-DES-CBC-SHA
AES:-kRSA
AES:RC4
kEDH+EXPORT:-MD5


The examples above demonstrate the syntax only and may contain unsupported cipher suites.


derivedDataType DateTime
domainExtension

derivedDataType DateTime
domainExtension

derivedDataType DateTime
domainExtension
old:  
new:  

derivedDataType DateTimeWithoutOffset
domainExtension

derivedDataType DateTimeWithoutOffset
domainExtension

derivedDataType DifferenceFromUTC
domainExtension

derivedDataType DistinguishedName
domainExtension
old:  
new:  

derivedDataType EcimEmpty
domainExtension

derivedDataType EcimEmpty
domainExtension

derivedDataType EcimEmpty
domainExtension

derivedDataType IPAddress
description
  IP address or DNS name of a logical interface.
A host may Hosts can have one or more physical hardware network interfaces. Each of these interfaces is interfaces, each associated with an IP address. In addition, TCP/IP software also supports ���loopback��� interfaces (127.0.0.1 interfaces, 127.0.0.1 in IPv4 and ::1 in IPv6), IPv6, which do not use any physical hardware. There is a special IP address for listening on all interfaces (0.0.0.0 interfaces, 0.0.0.0 for IPv4 and ::0 for IPv6). IPv6.

A version Version 4 IP address is specified in addresses use dotted quad notation, for example 130.100.92.154. RFC 791 describes the syntax details. A version
Version
6 IP address is specified by addresses use 8 groups of 16 bit hexadecimal values separated by colons, for example 2001:0db8:85a3:0000:0000:8a2e:0370:7334. RFC 4291 describes the syntax details. A
DNS name is specified as a names must be fully qualified domain name, names, for example myhost.ericsson.com. Internet domain domains are loosely specified but RFC 1034 recommends a syntax.


derivedDataType IpDNSAddress
domainExtension

derivedDataType IpDNSAddress
description
  The IpDNSAddress type represents an IP address or a DNS domain name.
A version 4 IP An unicast IPv4 address is presented in three-digit decimal blocks. It is specified in dotted quad notation, for example 130.100.92.154. RFC 791 describes the syntax dotted-quad decimal notation (i.e. three-digit decimal blocks) in detail. A version 6 accordance with RFC791, The blocks are separated by a dot.
- The unicast IPV4 address is within range [1-126,128-223].[0-255].[0-255].[0-255], 7-15 characters.
- The
IP address range 127.0.0.0 ��� 127.255.255.255 is reserved for loopback
- The IP address range 0��� 0.255.255.255 are reserved

A IPv6 address is
specified by 8 groups of 16 bit hexadecimal values separated by colons, for example, 2001:0db8:85a3:0000:0000:8a2e:0370:7334. colons as described in RFC 4291 describes 4291.
��� IPv6 addresses length: 3-39 characters.
��� Valid characters: 0123456789abcdefABCDEF:
The format of
the syntax embedded IPv4/IPv6 addresses is described in detail. RFC 6052.

A DNS domain name is specified in dot separated alphanumeric notation as a fully qualified domain name, for example, myhost.ericsson.com. described in RFC 1034 . The internet domain name consists of one or more parts, called labels, that are delimited by dots.
- Domain Name length: 253 characters
- Label length: 63 characters
- Valid characters: a-z, A-Z, 0,1,2,3,4,5,6,7,8,9, -
- The Label���s first character
is loosely specified but RFC 1034 recommends a syntax. letter
- Labels shall not start or end with a hyphen.
- Labels shall not start with a number
- Label shall end with a number or a letter.


domainExtension
baseType
string
validValues
old:  ^((([0-9][1-9])|([1-9][0-9])|[1-9]|1[0-1][0-9]|12[0-6]|12[8-9]|1[3-9][0-9]|2[0-2][0-3])\.)((([2][5][0-5]|([2][0-4]|[1][0-9]|[0-9])?[0-9])\.){2})([2][5][0-5]|([2][0-4]|[1][0-9]|[0-9])?[0-9])$|^\s*((([0-9A-Fa-f]{1,4}:){7}(([0-9A-Fa-f]{1,4})|:))|(([0-9A-Fa-f]{1,4}:){6}(:|((25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})|(:[0-9A-Fa-f]{1,4})))|(([0-9A-Fa-f]{1,4}:){5}((:((25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|((:[0-9A-Fa-f]{1,4}){1,2})))|(([0-9A-Fa-f]{1,4}:){4}(:[0-9A-Fa-f]{1,4}){0,1}((:((25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|((:[0-9A-Fa-f]{1,4}){1,2})))|(([0-9A-Fa-f]{1,4}:){3}(:[0-9A-Fa-f]{1,4}){0,2}((:((25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|((:[0-9A-Fa-f]{1,4}){1,2})))|(([0-9A-Fa-f]{1,4}:){2}(:[0-9A-Fa-f]{1,4}){0,3}((:((25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|((:[0-9A-Fa-f]{1,4}){1,2})))|(([0-9A-Fa-f]{1,4}:)(:[0-9A-Fa-f]{1,4}){0,4}((:((25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|((:[0-9A-Fa-f]{1,4}){1,2})))|(:(:[0-9A-Fa-f]{1,4}){0,5}((:((25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|((:[0-9A-Fa-f]{1,4}){1,2}))))(%.+)?\s*$|^(([a-zA-Z]|[a-zA-Z][a-zA-Z0-9\-]*[a-zA-Z0-9])\.)*([A-Za-z]|[A-Za-z][A-Za-z0-9\-]*[A-Za-z0-9])$
new:  ^(((|[1-9]|[1-9][0-9]|12[012345689]|1[013456789][0-9]|2[0-1][0-9]|22[0-3])\.)(([0-9]|[0-9][0-9]|[0-1][0-9][0-9]|2[0-4][0-9]|25[0-5])\.){2})([0-9]|[0-9][0-9]|[0-1][0-9][0-9]|2[0-4][0-9]|25[0-5])$|^((([0-9A-Fa-f]{1,4}:){1,5}:((25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|(([0-9A-Fa-f]{1,4}:){6,7}:)|(([0-9A-Fa-f]{1,4}:){6}((25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3}))|(([0-9A-Fa-f]{1,4}:){6}:[0-9A-Fa-f]{1,4})|(([0-9A-Fa-f]{1,4}:){5}(:[0-9A-Fa-f]{1,4}){1,2})|(([0-9A-Fa-f]{1,4}:){4}(:[0-9A-Fa-f]{1,4}(:(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?))|(([0-9A-Fa-f]{1,4}:){4}(:[0-9A-Fa-f]{1,4}){2,3})|((([0-9A-Fa-f]{1,4}:){3}(:[0-9A-Fa-f]{1,4}){1,2})(:(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|(([0-9A-Fa-f]{1,4}:){3}(:[0-9A-Fa-f]{1,4}){3,4})|(([0-9A-Fa-f]{1,4}:){2}(:[0-9A-Fa-f]{1,4}){1,3}(:(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|(([0-9A-Fa-f]{1,4}:){2}(:[0-9A-Fa-f]{1,4}){4,5})|(([0-9A-Fa-f]{1,4}:)(:[0-9A-Fa-f]{1,4}){1,4}(:(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|(([0-9A-Fa-f]{1,4}:)(:[0-9A-Fa-f]{1,4}){5,6})|((:(:[0-9A-Fa-f]{1,4}){1,5})(:(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})?)|(:(:[0-9A-Fa-f]{1,4}){6,7})|(([0-9A-Fa-f]{1,4}:){7}[0-9A-Fa-f]{1,4})|(((::FFFF)|(0:0:0:0:0:FFFF))(:(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})(\.(25[0-5]|2[0-4][0-9]|[01]?[0-9]{1,2})){3})))$|^(([a-zA-Z]|[a-zA-Z][a-zA-Z0-9\-]*[a-zA-Z0-9])\.)*([A-Za-z]|[A-Za-z][A-Za-z0-9\-]*[A-Za-z0-9])$|^ $
validationRules
rule Pattern Constraint

derivedDataType LdapDistinguishedName
description
  Represents the international standard for the representation of Distinguished Names to be used with the LDAP protocol (RFC 4514). 4514).
The string representation of the Distinguished Name structure is as follows: follows:

distinguishedName = [ relativeDistinguishedName ( COMMA relativeDistinguishedName ) ] ]
relativeDistinguishedName = attributeTypeAndValue ( PLUS attributeTypeAndValue ) )
attributeTypeAndValue = attributeType EQUALS attributeValue attributeValue
attributeType = descr/numericoid descr/numericoid
attributeValue = string/hexstring

derivedDataType SecSecM_UserManagement_targetType
validationRules

derivedDataType SnmpOid
baseType
string
validValues
old:  ^([0-9\.]*)$
new:  ^([\.]?[0-9]+)+$
validationRules
rule Pattern Constraint


  Differences in Derived Data Types