About VMware Smart Assurance IP Manager Certification
Certification is a process by which VMware Inc. ensures that the devices that are managed by the IP Manager are properly represented in the modeled topology, and that the devices are correctly monitored for connectivity and performance analysis. Devices are specific models of systems.
The certification process consists of three major parts:
-
Discovery of the device, including the device’s components (such as cards, ports) and endpoints (such as IP addresses, MAC addresses).
-
Building of Layer 2 (data link) and Layer 3 (network) connectivity.
-
Verification of operational status of the device and its components.
The VMware Smart Assurance IP Manager Certification Matrix available at VMware Online Support (https://docs.vmware.com) identifies the vendor-specific models that are supported by the IP Manager.
Certification Levels
A device may have one of three certification levels:
-
CERTIFIED: VMware has successfully tested a simulation of the device by using standard and proprietary MIBs that are supplied by the vendor. The IP Manager discovers the device by using standard MIB-II data and proprietary MIBs.
-
TEMPLATE: VMware Inc. that the device supports some standard and proprietary MIBs, but Dell has not tested the device. The IP Manager recognizes the object ID (OID), but has no information about the MIBs that this device supports.
-
GENERIC: VMware Inc. does not have the OID for the device. The IP Manager does not recognize the OID and responds by classifying the certification level of the device as GENERIC, adding the device to the Node class, and analyzing the device by using MIB-II data.
Note: A certification level named VALIDATED still appears in the oid2type configuration files but is no longer used. VALIDATED has essentially the same meaning as CERTIFIED.
############################################################################################################################# ## # VERSION HISTORY # # Version | Published Date | Description # 1.0 | August 2021 | First release of the document. Lists 10 simple certifications. # 2.0 | September 2021 | Second release of the document. Lists 17 simple certifications. # # # INSTRUCTIONS # # 1. Find the System Object ID (SysOID) of the device you intend to # certify in the list of certified devices. # 2. Copy the device certification code starting from the # device SysOID till the next SysOID (including the braces). # 3. Open the oid2type_Field.conf file using sm_edit and paste the # contents at the end of the file. Then save and close the file. # 4. If the SysOID is already certified and you are looking to apply an # updated certification, use sm_edit to remove the old certification from the # oid2type_/oid2type_misc/oid2type_Field.conf file. # 5. To load new certifications into a domain, run the following command: # /smarts/bin/sm_tpmgr -s --reloadoid # 6. Check IP domain log file for errors. # 7. You can also see the exact certification used for a device in a running server by executing # /smarts/bin/dmctl -s get ICF_TopologyManager::ICF-TopologyManager| grep # # 8. The certifications in this file will be included in the next GA release. # If you install a new GA release (hotfix patch, service pack, minor, or major release), # remove the redundant or duplicate entry from the oid2type_Field.conf file. # # The conf files are located in: # /smarts/conf/discovery and in the # /smarts/local/conf/discovery directory. # Use /smarts/bin/sm_edit to ensure that all modifications are # stored under local and read in by the domain. # ## # The following simple certifications are supported on IP versions: IP 10.1.5.1 # Purpose: This file contains the list of certification code entries that # can be added to the existing oid2type_Field.conf file to enable # discovery and monitoring of the device. ## ## # # SL No TASC SYSOID VENDOR MODEL # # 1 306387 .1.3.6.1.4.1.2636.1.1.1.4.82.27 JUNIPER jnxProductQFX512048T # 2 306405 .1.3.6.1.4.1.9.12.3.1.3.2378 CISCO 93180YC-FX3S # 3 306436 .1.3.6.1.4.1.9.1.2991 CISCO Cisco Firepower Threat Defense # 4 306406 .1.3.6.1.4.1.9.1.2650 CISCO 8202-SYS # 5 306414 .1.3.6.1.4.1.9.1.2376 CISCO ENCS5408/K9 CIMC # 6 306330 .1.3.6.1.4.1.2636.1.1.1.4.138.3 JUNIPER NFX250ATTLS1 # 7 306336 .1.3.6.1.4.1.12356.101.1.42002 FORTINET FortiGate 4201F # 8 306319 .1.3.6.1.4.1.23867.1.2.46 SILVERPEAK spsECV # 9 306335 .1.3.6.1.4.1.12356.101.1.6006 FORTINET FortiGate 601E # 10 306440 .1.3.6.1.4.1.9.1.2483 CISCO FirePOWER 1010 # 11 306434 .1.3.6.1.4.1.12356.101.1.45 FORTINET fgtVM64AWS # 12 306395 .1.3.6.1.4.1.9.6.1.83.28.3 CISCO SF300-28MP # 13 306399 .1.3.6.1.4.1.9.6.1.82.8.4 CISCO SF300-08 # 14 306404 .1.3.6.1.4.1.9.1.3075 CISCO ASR-9903 # 15 306431 .1.3.6.1.4.1.9.12.3.1.3.2193 CISCO cevChassisN9KC93180YCFX3 # 16 306384 .1.3.6.1.4.1.10734.1.3.51 TIPPINGPOINT 8200TX-IPS # 17 306445 .1.3.6.1.4.1.9.1.2649 CISCO Cisco8201-SYS # 18 306448 .1.3.6.1.4.1.12356.101.1.15002 FORTINET FortiGate-1801F # 19 306339 .1.3.6.1.4.1.29671.2.118 CISCO Meraki MX67 # 20 306455 .1.3.6.1.4.1.2636.1.1.1.4.132.7 JUNIPER jnxProductEX2300port24MP # 21 306456 .1.3.6.1.4.1.2636.1.1.1.4.132.8 JUNIPER jnxProductEX2300port48MP # 22 306318 .1.3.6.1.4.1.9.1.2663 CISCO ciscoFpr1120td # 23 306415 .1.3.6.1.4.1.2636.1.1.1.2.164 JUNIPER SRX380 # 24 306407 .1.3.6.1.4.1.2620.1.6.123.1.99 CHECKPOINT CPAP-SG4200-NGFW # 25 306438 .1.3.6.1.4.1.45346.1.1 VMWARE VeloCloud edge # 26 306454 .1.3.6.1.4.1.2636.1.1.1.4.63.9 JUNIPER EX4300-48mp # 27 306417 .1.3.6.1.4.1.2011.2.23.529 HUAWEI S2720-28TP-EI # # #New certifications available in the 1.0 version released in August 2021 #New certifications available in the 2.0 version released in September 2021 ## # Juniper jnxProductQFX512048T Switch .1.3.6.1.4.1.2636.1.1.1.4.82.27 { TYPE = Switch VENDOR = Juniper MODEL = jnxProductQFX512048T CERTIFICATION = CERTIFIED CONT = Juniper-EX-Series HEALTH = Juniper-EX8208 HOSTRESRCS = Juniper-MIB2 VLAN = Dot1q NEIGHBOR = LLDP-ATM-Peer INSTRUMENTATION: Environment = JuniperEnvMon:DeviceID CPU/Memory = JuniperRouter:DeviceID FileSystem-Performance = HostResources:DeviceID Disk-Fault = HostResources:DeviceID Card-Fault = Juniper Interface-Fault = MIB2 Interface-Performance = MIB2SNMP Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #Cisco 93180YC-FX3S Switch .1.3.6.1.4.1.9.12.3.1.3.2378 { TYPE = Switch VENDOR = Cisco MODEL = 93180YC-FX3S CERTIFICATION = CERTIFIED CONT = Cisco-Nexus-NON-CLI HEALTH = Nexus-Entity-EntSensor VLAN = Cisco-Membership NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEntityFRU:DeviceID Card-Fault = CiscoEntityRF:DeviceID CPU/Memory = CiscoNexus:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #Cisco Firepower Threat Defense .1.3.6.1.4.1.9.1.2991 { TYPE = Firewall VENDOR = Cisco MODEL = Cisco Firepower Threat Defense CERTIFICATION = CERTIFIED CONT = Cisco-Router-Entity HEALTH = Cisco-Router NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEnvMon:DeviceID CPU/Memory = CiscoRouter:DeviceID Card-Fault = CiscoEntityFRU:DeviceID Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet } #Cisco 2650 Serial Fast Ethernet Router .1.3.6.1.4.1.9.1.2650 { TYPE = Router VENDOR = Cisco MODEL = 8202-SYS CERTIFICATION = CERTIFIED CONT = Cisco-Entity HEALTH = Cisco-ASR9k-EntSensor NEIGHBOR = LLDP-CDP INSTRUMENTATION: Card-Fault = CiscoEntityFRU Environment = CiscoEntityFRU:DeviceID CPU/Memory = CiscoRouter:DeviceID Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet } #Cisco ENCS 5408 .1.3.6.1.4.1.9.1.2376 { TYPE = Switch VENDOR = Cisco MODEL = ENCS5408/K9 CIMC CERTIFICATION = CERTIFIED CONT = Cisco-L3Switch HEALTH = Cisco-Router-CRS-EntSensor VLAN = Cisco-Membership NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEntityFRU:DeviceID CPU/Memory = CiscoRouter:DeviceID Card-Fault = CiscoEntityFRU Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } # Juniper NFX250ATTLS1 .1.3.6.1.4.1.2636.1.1.1.4.138.3 { TYPE = Router VENDOR = Juniper MODEL = NFX250ATTLS1 CERTIFICATION = CERTIFIED CONT = Juniper-Chassis HEALTH = Juniper-EX8208 HOSTRESRCS = Juniper-MIB2 NEIGHBOR = LLDP INSTRUMENTATION: Environment = JuniperEnvMon:DeviceID CPU/Memory = JuniperRouter:DeviceID FileSystem-Performance = HostResources:DeviceID Disk-Fault = HostResources:DeviceID Card-Fault = Juniper Interface-Fault = MIB2 Interface-Performance = MIB2SNMP } #Fortinet FortiGate 4201F Firewall .1.3.6.1.4.1.12356.101.1.42002 { TYPE = Firewall VENDOR = Fortinet MODEL = FortiGate 4201F CERTIFICATION = CERTIFIED CONT = Fortinet HEALTH = Fortigate-Health NEIGHBOR = LLDP INSTRUMENTATION: Environment = Fortinet_Fortigate:DeviceID CPU/Memory = Fortigate:DeviceID Disk-Fault = Fortigate:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #SilverPeak spsECV .1.3.6.1.4.1.23867.1.2.46 { TYPE = Host VENDOR = SilverPeak MODEL = spsECV CERTIFICATION = CERTIFIED CONT = Generic-MIB2 HOSTRESRCS = MIB2 NEIGHBOR = LLDP INSTRUMENTATION: CPU/Memory = HostResources:DeviceID Disk-Fault = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #Fortinet FortiGate 601E Firewall .1.3.6.1.4.1.12356.101.1.6006 { TYPE = Firewall VENDOR = Fortinet MODEL = FortiGate 601E CERTIFICATION = CERTIFIED CONT = Fortinet HEALTH = Fortigate-Health NEIGHBOR = LLDP INSTRUMENTATION: Environment = Fortinet_Fortigate:DeviceID CPU/Memory = Fortigate:DeviceID Disk-Fault = Fortigate:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #Cisco FirePOWER 1010 Security Appliance .1.3.6.1.4.1.9.1.2483 { TYPE = Firewall VENDOR = Cisco MODEL = FirePOWER 1010 CERTIFICATION = CERTIFIED CONT = Cisco-Router-Entity HEALTH = Cisco-Router NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEnvMon:DeviceID CPU/Memory = CiscoRouter:DeviceID Card-Fault = CiscoEntityFRU:DeviceID Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet } #Fortinet fgtVM64AWS .1.3.6.1.4.1.12356.101.1.45 { TYPE = Firewall VENDOR = Fortinet MODEL = fgtVM64AWS CERTIFICATION = CERTIFIED CONT = Fortinet HEALTH = Fortigate-Health NEIGHBOR = LLDP INSTRUMENTATION: Disk-Fault = Fortigate:DeviceID Environment = Fortinet_Fortigate:DeviceID CPU/Memory = Fortigate:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #Cisco SG300-28MP 28-Port Gigabit PoE Managed Switch .1.3.6.1.4.1.9.6.1.83.28.3 { TYPE = Switch VENDOR = Cisco MODEL = SG300-28MP CERTIFICATION = CERTIFIED CONT = Generic-Switch HEALTH = RadLan VLAN = Dot1q NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = RadLan:DeviceID CPU/Memory = RadLan Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #Cisco SF300-08 8-Port 10/100 Managed Switch .1.3.6.1.4.1.9.6.1.82.8.4 { TYPE = Switch VENDOR = Cisco MODEL = SF300-08 CERTIFICATION = CERTIFIED CONT = Generic-Switch HEALTH = RadLan VLAN = Dot1q NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = RadLan:DeviceID CPU/Memory = RadLan Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #Cisco ASR-9903 Router .1.3.6.1.4.1.9.1.3075 { TYPE = Router VENDOR = Cisco MODEL = ASR-9903 CERTIFICATION = CERTIFIED CONT = Cisco-Router-CardSelect HEALTH = Cisco-ASR9k-EntSensor NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEntityFRU:DeviceID CPU/Memory = CiscoRouter:DeviceID Card-Fault = CiscoEntityFRU Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet } # CISCO cevChassisN9KC93180YCFX3 .1.3.6.1.4.1.9.12.3.1.3.2193 { TYPE = Switch VENDOR = Cisco MODEL = cevChassisN9KC93180YCFX3 CERTIFICATION = CERTIFIED CONT = Cisco-Nexus-NON-CLI HEALTH = Nexus-Entity-EntSensor VLAN = Cisco-Membership NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEntityFRU:DeviceID Card-Fault = CiscoEntityRF:DeviceID CPU/Memory = CiscoNexus:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } # TippingPoint 8200TX-IPS .1.3.6.1.4.1.10734.1.3.51 { TYPE = Firewall VENDOR = TippingPoint MODEL = 8200TX-IPS CERTIFICATION = CERTIFIED CONT = Generic-MIB2 HEALTH = TippingPoint NEIGHBOR = LLDP INSTRUMENTATION: FileSystem-Performance = TippingPoint:DeviceID CPU/Memory = TippingPoint:DeviceID Environment = TippingPointEnvMon:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } # CISCO Cisco8201-SYS .1.3.6.1.4.1.9.1.2649 { TYPE = Router VENDOR = Cisco MODEL = Cisco8201-SYS CERTIFICATION = CERTIFIED CONT = Cisco-IOSXR HEALTH = Cisco-IOSXR-EntSensor VLAN = Cisco-Membership NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEntityFRU:DeviceID CPU/Memory = CiscoRouter:DeviceID Card-Fault = CiscoEntityFRU Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet } # Fortinet FG-1801F .1.3.6.1.4.1.12356.101.1.15002 { TYPE = Firewall VENDOR = Fortinet MODEL = FortiGate-1801F CERTIFICATION = TEMPLATE CONT = Fortinet HEALTH = Fortigate-Health NEIGHBOR = LLDP INSTRUMENTATION: Environment = Fortinet_Fortigate:DeviceID CPU/Memory = Fortigate:DeviceID Disk-Fault = Fortigate:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #Cisco Meraki MX67 Router .1.3.6.1.4.1.29671.2.118 { TYPE = Router VENDOR = Cisco MODEL = Meraki MX67 CERTIFICATION = CERTIFIED CONT = Generic-Router NEIGHBOR = LLDP-CDP INSTRUMENTATION: Interface-Fault = MIB2 Interface-Performance = MIB2 Interface-Ethernet-Performance = CiscoRouter_Ethernet } # Juniper jnxProductEX2300port24MP .1.3.6.1.4.1.2636.1.1.1.4.132.7 { TYPE = Switch VENDOR = Juniper MODEL = jnxProductEX2300port24MP CERTIFICATION = CERTIFIED DASLDRIVER = JuniperERX CONT = Juniper-VCC-Check HEALTH = Juniper-EX8208 HOSTRESRCS = Juniper-MIB2 NEIGHBOR = LLDP-ATM-Peer VLAN = Dot1q INSTRUMENTATION: Environment = JuniperEnvMon:DeviceID CPU/Memory = JuniperRouter:DeviceID FileSystem-Performance = HostResources:DeviceID Disk-Fault = HostResources:DeviceID Card-Fault = Juniper Interface-Fault = MIB2 Interface-Performance = MIB2SNMP Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } # Juniper jnxProductEX2300port48MP .1.3.6.1.4.1.2636.1.1.1.4.132.8 { TYPE = Switch VENDOR = Juniper MODEL = jnxProductEX2300port48MP CERTIFICATION = CERTIFIED DASLDRIVER = JuniperERX CONT = Juniper-VCC-Check HEALTH = Juniper-EX8208 HOSTRESRCS = Juniper-MIB2 NEIGHBOR = LLDP-ATM-Peer VLAN = Dot1q INSTRUMENTATION: Environment = JuniperEnvMon:DeviceID CPU/Memory = JuniperRouter:DeviceID FileSystem-Performance = HostResources:DeviceID Disk-Fault = HostResources:DeviceID Card-Fault = Juniper Interface-Fault = MIB2 Interface-Performance = MIB2SNMP Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #Cisco Firepower 1120 Security Appliance .1.3.6.1.4.1.9.1.2663 { TYPE = Firewall VENDOR = Cisco MODEL = ciscoFpr1120td CERTIFICATION = CERTIFIED CONT = Cisco-Router HEALTH = Cisco-Router NEIGHBOR = LLDP-CDP INSTRUMENTATION: Card-Fault = OldCiscoChassis Environment = CiscoEntityFRU:DeviceID CPU/Memory = CiscoRouter:DeviceID Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet } # Juniper SRX380 .1.3.6.1.4.1.2636.1.1.1.2.164 { TYPE = Firewall VENDOR = Juniper MODEL = SRX380 CERTIFICATION = CERTIFIED CONT = Juniper-Chassis HEALTH = Juniper-EX8208 HOSTRESRCS = Juniper-MIB2 NEIGHBOR = LLDP INSTRUMENTATION: Disk-Fault = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID Environment = JuniperEnvMon:DeviceID CPU/Memory = JuniperRouter:DeviceID Card-Fault = Juniper Interface-Fault = MIB2 Interface-Performance = MIB2 } #Checkpoint CPAP-SG4200-NGFW Firewall .1.3.6.1.4.1.2620.1.6.123.1.99 { TYPE = Firewall VENDOR = CheckPoint MODEL = CPAP-SG4200-NGFW CERTIFICATION = CERTIFIED CONT = Generic-MIB2 HOSTRESRCS = MIB2-Checkpoint-Other HEALTH = Checkpoint-Firewall NEIGHBOR = LLDP INSTRUMENTATION: Environment = Checkpoint_Firewall:DeviceID Disk-Fault = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID CPU/Memory = Checkpoint:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #VMware VeloCloud edge .1.3.6.1.4.1.45346.1.1 { TYPE = Host VENDOR = VMware MODEL = VeloCloud edge CERTIFICATION = CERTIFIED CONT = Generic-MIB2 HOSTRESRCS = MIB2 NEIGHBOR = LLDP INSTRUMENTATION: CPU/Memory = HostResources:DeviceID Disk-Fault = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } # Juniper EX4300-48mp .1.3.6.1.4.1.2636.1.1.1.4.63.9 { TYPE = Switch VENDOR = Juniper MODEL = EX4300-48mp CERTIFICATION = CERTIFIED DASLDRIVER = JuniperERX CONT = Juniper-VCC-Check NEIGHBOR = LLDP-ATM-Peer HEALTH = Juniper-EX8208 HOSTRESRCS = Juniper-MIB2 VLAN = Dot1q BRIDGE = Dot1q INSTRUMENTATION: Environment = JuniperEnvMon:DeviceID CPU/Memory = JuniperRouter:DeviceID FileSystem-Performance = HostResources:DeviceID Disk-Fault = HostResources:DeviceID Card-Fault = Juniper Interface-Fault = MIB2 Interface-Performance = MIB2SNMP Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #Huawei S2720-28TP-EI Switch .1.3.6.1.4.1.2011.2.23.529 { TYPE = Switch VENDOR = Huawei MODEL = S2720-28TP-EI CERTIFICATION = CERTIFIED CONT = Huawei-Entity-Switch HEALTH = Huawei-Router VLAN = Huawei-Vlan-L2 NEIGHBOR = LLDP INSTRUMENTATION: CPU/Memory = HuaweiRouter:DeviceID Environment = HuaweiEntity:DeviceID Card-Fault = HuaweiEntity:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet }