About VMware Smart Assurance IP Manager Certification

Certification is a process by which VMware Inc. ensures that the devices that are managed by the IP Manager are properly represented in the modeled topology, and that the devices are correctly monitored for connectivity and performance analysis. Devices are specific models of systems.

The certification process consists of three major parts:

  • Discovery of the device, including the device’s components (such as cards, ports) and endpoints (such as IP addresses, MAC addresses). 

  • Building of Layer 2 (data link) and Layer 3 (network) connectivity. 

  • Verification of operational status of the device and its components.

The VMware Smart Assurance IP Manager Certification Matrix available at VMware Online Support (https://docs.vmware.com) identifies the vendor-specific models that are supported by the IP Manager.

Certification Levels

 A device may have one of three certification levels: 

  • CERTIFIED: VMware has successfully tested a simulation of the device by using standard and proprietary MIBs that are supplied by the vendor. The IP Manager discovers the device by using standard MIB-II data and proprietary MIBs.

  • TEMPLATE: VMware Inc. that the device supports some standard and proprietary MIBs, but Dell has not tested the device. The IP Manager recognizes the object ID (OID), but has no information about the MIBs that this device supports.

  • GENERIC: VMware Inc. does not have the OID for the device. The IP Manager does not recognize the OID and responds by classifying the certification level of the device as GENERIC, adding the device to the Node class, and analyzing the device by using MIB-II data.

Note: A certification level named VALIDATED still appears in the oid2type configuration files but is no longer used. VALIDATED has essentially the same meaning as CERTIFIED.

#############################################################################################################################
##
# VERSION HISTORY
#
# Version | Published Date | Description
# 1.0     | August 2021    | First release of the document. Lists 10 simple certifications.
# 2.0     | September 2021 | Second release of the document. Lists 17 simple certifications.
# 
#
# INSTRUCTIONS
#
# 1. Find the System Object ID (SysOID) of the device you intend to
# certify in the list of certified devices.
# 2. Copy the device certification code starting from the
# device SysOID till the next SysOID (including the braces).
# 3. Open the oid2type_Field.conf file using sm_edit and paste the
# contents at the end of the file. Then save and close the file.
# 4. If the SysOID is already certified and you are looking to apply an
# updated certification, use sm_edit to remove the old certification from the
# oid2type_/oid2type_misc/oid2type_Field.conf file.
# 5. To load new certifications into a domain, run the following command:
# /smarts/bin/sm_tpmgr -s  --reloadoid
# 6. Check IP domain log file for errors.
# 7. You can also see the exact certification used for a device in a running server by executing
# /smarts/bin/dmctl -s  get ICF_TopologyManager::ICF-TopologyManager| grep
#
# 8. The certifications in this file will be included in the next GA release.
# If you install a new GA release (hotfix patch, service pack, minor, or major release),
# remove the redundant or duplicate entry from the oid2type_Field.conf file.
#
# The conf files are located in:
# /smarts/conf/discovery and in the
# /smarts/local/conf/discovery directory.
# Use /smarts/bin/sm_edit to ensure that all modifications are
# stored under local and read in by the domain.
#
##
# The following simple certifications are supported on IP versions: IP 10.1.5.1
# Purpose: This file contains the list of certification code entries that
# can be added to the existing oid2type_Field.conf file to enable
# discovery and monitoring of the device.
##
##
#
#   SL No   TASC        SYSOID                                             VENDOR         MODEL
#
#    1     306387      .1.3.6.1.4.1.2636.1.1.1.4.82.27                     JUNIPER        jnxProductQFX512048T
#    2     306405      .1.3.6.1.4.1.9.12.3.1.3.2378                        CISCO          93180YC-FX3S
#    3     306436      .1.3.6.1.4.1.9.1.2991                               CISCO          Cisco Firepower Threat Defense
#    4     306406      .1.3.6.1.4.1.9.1.2650                               CISCO          8202-SYS
#    5     306414      .1.3.6.1.4.1.9.1.2376                               CISCO          ENCS5408/K9 CIMC
#    6     306330      .1.3.6.1.4.1.2636.1.1.1.4.138.3                     JUNIPER        NFX250ATTLS1
#    7     306336      .1.3.6.1.4.1.12356.101.1.42002                      FORTINET       FortiGate 4201F
#    8     306319      .1.3.6.1.4.1.23867.1.2.46                           SILVERPEAK     spsECV
#    9     306335      .1.3.6.1.4.1.12356.101.1.6006                       FORTINET       FortiGate 601E
#    10    306440      .1.3.6.1.4.1.9.1.2483                               CISCO          FirePOWER 1010
#    11    306434      .1.3.6.1.4.1.12356.101.1.45                         FORTINET       fgtVM64AWS
#    12    306395      .1.3.6.1.4.1.9.6.1.83.28.3                          CISCO          SF300-28MP
#    13    306399      .1.3.6.1.4.1.9.6.1.82.8.4                           CISCO          SF300-08
#    14    306404      .1.3.6.1.4.1.9.1.3075                               CISCO          ASR-9903
#    15    306431      .1.3.6.1.4.1.9.12.3.1.3.2193                        CISCO          cevChassisN9KC93180YCFX3
#    16    306384      .1.3.6.1.4.1.10734.1.3.51                           TIPPINGPOINT   8200TX-IPS
#    17    306445      .1.3.6.1.4.1.9.1.2649                               CISCO          Cisco8201-SYS
#    18    306448      .1.3.6.1.4.1.12356.101.1.15002                      FORTINET       FortiGate-1801F
#    19    306339      .1.3.6.1.4.1.29671.2.118                            CISCO          Meraki MX67
#    20    306455      .1.3.6.1.4.1.2636.1.1.1.4.132.7                     JUNIPER        jnxProductEX2300port24MP
#    21    306456      .1.3.6.1.4.1.2636.1.1.1.4.132.8                     JUNIPER        jnxProductEX2300port48MP
#    22    306318      .1.3.6.1.4.1.9.1.2663                               CISCO          ciscoFpr1120td
#    23    306415      .1.3.6.1.4.1.2636.1.1.1.2.164                       JUNIPER        SRX380
#    24    306407      .1.3.6.1.4.1.2620.1.6.123.1.99                      CHECKPOINT     CPAP-SG4200-NGFW
#    25    306438      .1.3.6.1.4.1.45346.1.1                              VMWARE         VeloCloud edge
#    26    306454      .1.3.6.1.4.1.2636.1.1.1.4.63.9                      JUNIPER        EX4300-48mp
#    27    306417      .1.3.6.1.4.1.2011.2.23.529                          HUAWEI         S2720-28TP-EI
#    
#
#New certifications available in the 1.0 version released in August 2021
#New certifications available in the 2.0 version released in September 2021
##

# Juniper jnxProductQFX512048T Switch
.1.3.6.1.4.1.2636.1.1.1.4.82.27 {
    TYPE             = Switch
    VENDOR           = Juniper
    MODEL            = jnxProductQFX512048T
    CERTIFICATION    = CERTIFIED
    CONT             = Juniper-EX-Series
    HEALTH           = Juniper-EX8208
    HOSTRESRCS       = Juniper-MIB2
    VLAN             = Dot1q
    NEIGHBOR         = LLDP-ATM-Peer

 INSTRUMENTATION:
    Environment                 = JuniperEnvMon:DeviceID
    CPU/Memory                  = JuniperRouter:DeviceID
    FileSystem-Performance      = HostResources:DeviceID
    Disk-Fault                  = HostResources:DeviceID
    Card-Fault                  = Juniper
    Interface-Fault             = MIB2
    Interface-Performance       = MIB2SNMP
    Port-Fault                  = MIB2
    Port-Performance            = MIB2
    Port-Ethernet-Performance   = dot3_Ethernet
}

#Cisco 93180YC-FX3S Switch
.1.3.6.1.4.1.9.12.3.1.3.2378 {
    TYPE                    = Switch
    VENDOR                  = Cisco
    MODEL                   = 93180YC-FX3S
    CERTIFICATION           = CERTIFIED
    CONT                    = Cisco-Nexus-NON-CLI
    HEALTH                  = Nexus-Entity-EntSensor
    VLAN                    = Cisco-Membership
    NEIGHBOR                = LLDP-CDP

INSTRUMENTATION:
    Environment                       = CiscoEntityFRU:DeviceID
    Card-Fault                        = CiscoEntityRF:DeviceID
    CPU/Memory                        = CiscoNexus:DeviceID
    Interface-Fault                   = MIB2
    Interface-Performance             = MIB2
    Port-Fault                        = MIB2
    Port-Performance                  = MIB2
    Port-Ethernet-Performance         = dot3_Ethernet
}

#Cisco Firepower Threat Defense
.1.3.6.1.4.1.9.1.2991 {
    TYPE            = Firewall
    VENDOR          = Cisco
    MODEL           = Cisco Firepower Threat Defense
    CERTIFICATION   = CERTIFIED
    CONT            = Cisco-Router-Entity 
    HEALTH          = Cisco-Router 
    NEIGHBOR        = LLDP-CDP 
                
INSTRUMENTATION:
    Environment                     = CiscoEnvMon:DeviceID 
    CPU/Memory                      = CiscoRouter:DeviceID 
    Card-Fault                      = CiscoEntityFRU:DeviceID 
    Interface-Fault                 = MIB2
    Interface-Performance           = CiscoRouter
    Interface-Ethernet-Performance  = CiscoRouter_Ethernet
}

#Cisco 2650 Serial Fast Ethernet Router
.1.3.6.1.4.1.9.1.2650 {
    TYPE                 = Router
    VENDOR               = Cisco
    MODEL                = 8202-SYS
    CERTIFICATION        = CERTIFIED
    CONT                 = Cisco-Entity
    HEALTH               = Cisco-ASR9k-EntSensor
    NEIGHBOR             = LLDP-CDP

INSTRUMENTATION:
    Card-Fault                         = CiscoEntityFRU
    Environment                        = CiscoEntityFRU:DeviceID
    CPU/Memory                         = CiscoRouter:DeviceID
    Interface-Fault                    = MIB2
    Interface-Performance              = CiscoRouter
    Interface-Ethernet-Performance     = CiscoRouter_Ethernet
}

#Cisco ENCS 5408
.1.3.6.1.4.1.9.1.2376 {
    TYPE            = Switch
    VENDOR          = Cisco
    MODEL           = ENCS5408/K9 CIMC
    CERTIFICATION   = CERTIFIED
    CONT            = Cisco-L3Switch
    HEALTH          = Cisco-Router-CRS-EntSensor
    VLAN            = Cisco-Membership
    NEIGHBOR        = LLDP-CDP

INSTRUMENTATION:
    Environment                     = CiscoEntityFRU:DeviceID
    CPU/Memory                      = CiscoRouter:DeviceID
    Card-Fault                      = CiscoEntityFRU
    Interface-Fault                 = MIB2
    Interface-Performance           = CiscoRouter
    Interface-Ethernet-Performance  = CiscoRouter_Ethernet
    Port-Fault                      = MIB2   
    Port-Performance                = MIB2   
    Port-Ethernet-Performance       = dot3_Ethernet
}

# Juniper NFX250ATTLS1
.1.3.6.1.4.1.2636.1.1.1.4.138.3 {
    TYPE             = Router
    VENDOR           = Juniper
    MODEL            = NFX250ATTLS1
    CERTIFICATION    = CERTIFIED
    CONT             = Juniper-Chassis
    HEALTH           = Juniper-EX8208
    HOSTRESRCS       = Juniper-MIB2
    NEIGHBOR         = LLDP

INSTRUMENTATION:
    Environment             = JuniperEnvMon:DeviceID
    CPU/Memory              = JuniperRouter:DeviceID
    FileSystem-Performance  = HostResources:DeviceID
    Disk-Fault              = HostResources:DeviceID
    Card-Fault              = Juniper
    Interface-Fault         = MIB2
    Interface-Performance   = MIB2SNMP
}

#Fortinet FortiGate 4201F Firewall
.1.3.6.1.4.1.12356.101.1.42002 {
    TYPE             = Firewall
    VENDOR           = Fortinet
    MODEL            = FortiGate 4201F
    CERTIFICATION    = CERTIFIED
    CONT             = Fortinet
    HEALTH           = Fortigate-Health
    NEIGHBOR         = LLDP
    
INSTRUMENTATION:
    Environment             = Fortinet_Fortigate:DeviceID
    CPU/Memory              = Fortigate:DeviceID
    Disk-Fault              = Fortigate:DeviceID
    Interface-Fault         = MIB2
    Interface-Performance   = MIB2
}

#SilverPeak spsECV
.1.3.6.1.4.1.23867.1.2.46 {
    TYPE             = Host
    VENDOR           = SilverPeak
    MODEL            = spsECV
    CERTIFICATION    = CERTIFIED
    CONT             = Generic-MIB2
    HOSTRESRCS       = MIB2
    NEIGHBOR         = LLDP
    
INSTRUMENTATION:
    CPU/Memory              = HostResources:DeviceID
    Disk-Fault              = HostResources:DeviceID
    FileSystem-Performance  = HostResources:DeviceID
    Interface-Fault         = MIB2
    Interface-Performance   = MIB2
}

#Fortinet FortiGate 601E Firewall
.1.3.6.1.4.1.12356.101.1.6006 {
    TYPE             = Firewall
    VENDOR           = Fortinet
    MODEL            = FortiGate 601E
    CERTIFICATION    = CERTIFIED
    CONT             = Fortinet
    HEALTH           = Fortigate-Health
    NEIGHBOR         = LLDP
    
INSTRUMENTATION:
    Environment             = Fortinet_Fortigate:DeviceID
    CPU/Memory              = Fortigate:DeviceID
    Disk-Fault              = Fortigate:DeviceID
    Interface-Fault         = MIB2
    Interface-Performance   = MIB2
}

#Cisco FirePOWER 1010 Security Appliance
.1.3.6.1.4.1.9.1.2483 {
    TYPE            = Firewall
    VENDOR          = Cisco
    MODEL           = FirePOWER 1010
    CERTIFICATION   = CERTIFIED
    CONT            = Cisco-Router-Entity 
    HEALTH          = Cisco-Router 
    NEIGHBOR        = LLDP-CDP 
                
INSTRUMENTATION:
    Environment                     = CiscoEnvMon:DeviceID 
    CPU/Memory                      = CiscoRouter:DeviceID 
    Card-Fault                      = CiscoEntityFRU:DeviceID 
    Interface-Fault                 = MIB2
    Interface-Performance           = CiscoRouter
    Interface-Ethernet-Performance  = CiscoRouter_Ethernet
}

#Fortinet  fgtVM64AWS
.1.3.6.1.4.1.12356.101.1.45 {
    TYPE          = Firewall
    VENDOR        = Fortinet
    MODEL         = fgtVM64AWS 
    CERTIFICATION = CERTIFIED
    CONT          = Fortinet
    HEALTH        = Fortigate-Health
    NEIGHBOR      = LLDP
    
INSTRUMENTATION:
    Disk-Fault            = Fortigate:DeviceID
    Environment           = Fortinet_Fortigate:DeviceID
    CPU/Memory            = Fortigate:DeviceID
    Interface-Fault       = MIB2
    Interface-Performance = MIB2
}

#Cisco SG300-28MP 28-Port Gigabit PoE Managed Switch
.1.3.6.1.4.1.9.6.1.83.28.3 {
    TYPE             = Switch
    VENDOR           = Cisco
    MODEL            = SG300-28MP
    CERTIFICATION    = CERTIFIED
    CONT             = Generic-Switch
    HEALTH           = RadLan
    VLAN             = Dot1q
    NEIGHBOR         = LLDP-CDP
    
INSTRUMENTATION:
    Environment                 = RadLan:DeviceID
    CPU/Memory                  = RadLan
    Interface-Fault             = MIB2
    Interface-Performance       = MIB2
    Port-Fault                  = MIB2
    Port-Performance            = MIB2
    Port-Ethernet-Performance   = dot3_Ethernet    
}

#Cisco SF300-08 8-Port 10/100 Managed Switch
.1.3.6.1.4.1.9.6.1.82.8.4 {
    TYPE             = Switch
    VENDOR           = Cisco
    MODEL            = SF300-08 
    CERTIFICATION    = CERTIFIED
    CONT             = Generic-Switch
    HEALTH           = RadLan
    VLAN             = Dot1q
    NEIGHBOR         = LLDP-CDP
    
INSTRUMENTATION:
    Environment                 = RadLan:DeviceID
    CPU/Memory                  = RadLan
    Interface-Fault             = MIB2
    Interface-Performance       = MIB2
    Port-Fault                  = MIB2
    Port-Performance            = MIB2
    Port-Ethernet-Performance   = dot3_Ethernet    
}

#Cisco ASR-9903 Router
.1.3.6.1.4.1.9.1.3075 {
    TYPE             = Router
    VENDOR           = Cisco
    MODEL            = ASR-9903
    CERTIFICATION    = CERTIFIED
    CONT             = Cisco-Router-CardSelect
    HEALTH           = Cisco-ASR9k-EntSensor
    NEIGHBOR         = LLDP-CDP

INSTRUMENTATION:
    Environment                         = CiscoEntityFRU:DeviceID
    CPU/Memory                          = CiscoRouter:DeviceID
    Card-Fault                          = CiscoEntityFRU
    Interface-Fault                     = MIB2
    Interface-Performance               = CiscoRouter
    Interface-Ethernet-Performance      = CiscoRouter_Ethernet
}

# CISCO cevChassisN9KC93180YCFX3
.1.3.6.1.4.1.9.12.3.1.3.2193 {
    TYPE             = Switch
    VENDOR           = Cisco
    MODEL            = cevChassisN9KC93180YCFX3
    CERTIFICATION    = CERTIFIED 
    CONT             = Cisco-Nexus-NON-CLI
    HEALTH           = Nexus-Entity-EntSensor
    VLAN             = Cisco-Membership
    NEIGHBOR         = LLDP-CDP

INSTRUMENTATION:
    Environment                  = CiscoEntityFRU:DeviceID
    Card-Fault                   = CiscoEntityRF:DeviceID
    CPU/Memory                   = CiscoNexus:DeviceID
    Interface-Fault              = MIB2
    Interface-Performance        = MIB2
    Port-Fault                   = MIB2
    Port-Performance             = MIB2
    Port-Ethernet-Performance    = dot3_Ethernet
}

# TippingPoint 8200TX-IPS 
.1.3.6.1.4.1.10734.1.3.51 {
    TYPE             = Firewall
    VENDOR           = TippingPoint
    MODEL            = 8200TX-IPS
    CERTIFICATION    = CERTIFIED
    CONT             = Generic-MIB2
    HEALTH           = TippingPoint
    NEIGHBOR         = LLDP
    
INSTRUMENTATION:
    FileSystem-Performance  = TippingPoint:DeviceID
    CPU/Memory              = TippingPoint:DeviceID
    Environment             = TippingPointEnvMon:DeviceID
    Interface-Fault         = MIB2
    Interface-Performance   = MIB2    
}

# CISCO Cisco8201-SYS
.1.3.6.1.4.1.9.1.2649 {
       TYPE            = Router
       VENDOR          = Cisco
       MODEL           = Cisco8201-SYS
       CERTIFICATION   = CERTIFIED
       CONT            = Cisco-IOSXR
       HEALTH          = Cisco-IOSXR-EntSensor
       VLAN            = Cisco-Membership
       NEIGHBOR        = LLDP-CDP

INSTRUMENTATION:
    Environment                       = CiscoEntityFRU:DeviceID
    CPU/Memory                        = CiscoRouter:DeviceID
    Card-Fault                        = CiscoEntityFRU
    Interface-Fault                   = MIB2
    Interface-Performance             = CiscoRouter
    Interface-Ethernet-Performance    = CiscoRouter_Ethernet
}

# Fortinet FG-1801F
.1.3.6.1.4.1.12356.101.1.15002 {
    TYPE                      = Firewall
    VENDOR                    = Fortinet
    MODEL                     = FortiGate-1801F
    CERTIFICATION             = TEMPLATE
    CONT                      = Fortinet
    HEALTH                    = Fortigate-Health
    NEIGHBOR                  = LLDP

INSTRUMENTATION:
    Environment               = Fortinet_Fortigate:DeviceID
    CPU/Memory                = Fortigate:DeviceID
    Disk-Fault                = Fortigate:DeviceID
    Interface-Fault           = MIB2
    Interface-Performance     = MIB2
}

#Cisco Meraki MX67 Router
.1.3.6.1.4.1.29671.2.118 {
    TYPE             = Router
    VENDOR           = Cisco
    MODEL            = Meraki MX67
    CERTIFICATION    = CERTIFIED
    CONT             = Generic-Router
    NEIGHBOR         = LLDP-CDP

INSTRUMENTATION:
    Interface-Fault                     = MIB2
    Interface-Performance               = MIB2
    Interface-Ethernet-Performance      = CiscoRouter_Ethernet
}

# Juniper jnxProductEX2300port24MP
.1.3.6.1.4.1.2636.1.1.1.4.132.7 {
    TYPE            = Switch
    VENDOR          = Juniper
    MODEL           = jnxProductEX2300port24MP
    CERTIFICATION   = CERTIFIED
    DASLDRIVER      = JuniperERX
    CONT            = Juniper-VCC-Check
    HEALTH          = Juniper-EX8208
    HOSTRESRCS      = Juniper-MIB2
    NEIGHBOR        = LLDP-ATM-Peer
    VLAN            = Dot1q

INSTRUMENTATION:
    Environment                 = JuniperEnvMon:DeviceID
    CPU/Memory                  = JuniperRouter:DeviceID
    FileSystem-Performance      = HostResources:DeviceID
    Disk-Fault                  = HostResources:DeviceID
    Card-Fault                  = Juniper
    Interface-Fault             = MIB2
    Interface-Performance       = MIB2SNMP
    Port-Fault                  = MIB2
    Port-Performance            = MIB2
    Port-Ethernet-Performance   = dot3_Ethernet
}

# Juniper  jnxProductEX2300port48MP 
.1.3.6.1.4.1.2636.1.1.1.4.132.8 {
    TYPE            = Switch
    VENDOR          = Juniper
    MODEL           = jnxProductEX2300port48MP
    CERTIFICATION   = CERTIFIED
    DASLDRIVER      = JuniperERX
    CONT            = Juniper-VCC-Check
    HEALTH          = Juniper-EX8208
    HOSTRESRCS      = Juniper-MIB2
    NEIGHBOR        = LLDP-ATM-Peer
    VLAN            = Dot1q

INSTRUMENTATION:
    Environment                 = JuniperEnvMon:DeviceID
    CPU/Memory                  = JuniperRouter:DeviceID
    FileSystem-Performance      = HostResources:DeviceID
    Disk-Fault                  = HostResources:DeviceID
    Card-Fault                  = Juniper
    Interface-Fault             = MIB2
    Interface-Performance       = MIB2SNMP
    Port-Fault                  = MIB2
    Port-Performance            = MIB2
    Port-Ethernet-Performance   = dot3_Ethernet
}

#Cisco Firepower 1120 Security Appliance
.1.3.6.1.4.1.9.1.2663 {
    TYPE                = Firewall
    VENDOR              = Cisco
    MODEL               = ciscoFpr1120td
    CERTIFICATION       = CERTIFIED
    CONT                = Cisco-Router
    HEALTH              = Cisco-Router
    NEIGHBOR            = LLDP-CDP 

INSTRUMENTATION:
    Card-Fault                          = OldCiscoChassis
    Environment                         = CiscoEntityFRU:DeviceID
    CPU/Memory                          = CiscoRouter:DeviceID
    Interface-Fault                     = MIB2
    Interface-Performance               = CiscoRouter
    Interface-Ethernet-Performance      = CiscoRouter_Ethernet
}

# Juniper SRX380
.1.3.6.1.4.1.2636.1.1.1.2.164 {
    TYPE          = Firewall 
    VENDOR        = Juniper
    MODEL         = SRX380
    CERTIFICATION = CERTIFIED
    CONT          = Juniper-Chassis
    HEALTH        = Juniper-EX8208
    HOSTRESRCS    = Juniper-MIB2
    NEIGHBOR      = LLDP

INSTRUMENTATION:
    Disk-Fault               = HostResources:DeviceID 
    FileSystem-Performance   = HostResources:DeviceID
    Environment              = JuniperEnvMon:DeviceID
    CPU/Memory               = JuniperRouter:DeviceID
    Card-Fault               = Juniper
    Interface-Fault          = MIB2
    Interface-Performance    = MIB2
}

#Checkpoint CPAP-SG4200-NGFW Firewall
.1.3.6.1.4.1.2620.1.6.123.1.99 {
    TYPE                             = Firewall
    VENDOR                           = CheckPoint
    MODEL                            = CPAP-SG4200-NGFW
    CERTIFICATION                    = CERTIFIED
    CONT                             = Generic-MIB2
    HOSTRESRCS                       = MIB2-Checkpoint-Other
    HEALTH                           = Checkpoint-Firewall
    NEIGHBOR                         = LLDP
              
INSTRUMENTATION:
    Environment                      = Checkpoint_Firewall:DeviceID
    Disk-Fault                       = HostResources:DeviceID
    FileSystem-Performance           = HostResources:DeviceID
    CPU/Memory                       = Checkpoint:DeviceID
    Interface-Fault                  = MIB2
    Interface-Performance            = MIB2
} 

#VMware VeloCloud edge
.1.3.6.1.4.1.45346.1.1 {
    TYPE             = Host
    VENDOR           = VMware
    MODEL            = VeloCloud edge
    CERTIFICATION    = CERTIFIED
    CONT             = Generic-MIB2
    HOSTRESRCS       = MIB2
    NEIGHBOR         = LLDP
    
INSTRUMENTATION:
    CPU/Memory              = HostResources:DeviceID
    Disk-Fault              = HostResources:DeviceID
    FileSystem-Performance  = HostResources:DeviceID
    Interface-Fault         = MIB2
    Interface-Performance   = MIB2
}

# Juniper EX4300-48mp
.1.3.6.1.4.1.2636.1.1.1.4.63.9 {
     TYPE           = Switch
     VENDOR         = Juniper
     MODEL          = EX4300-48mp
     CERTIFICATION  = CERTIFIED
     DASLDRIVER     = JuniperERX
     CONT           = Juniper-VCC-Check
     NEIGHBOR       = LLDP-ATM-Peer
     HEALTH         = Juniper-EX8208
     HOSTRESRCS     = Juniper-MIB2
     VLAN           = Dot1q
     BRIDGE         = Dot1q

 INSTRUMENTATION:
     Environment                = JuniperEnvMon:DeviceID
     CPU/Memory                 = JuniperRouter:DeviceID
     FileSystem-Performance     = HostResources:DeviceID
     Disk-Fault                 = HostResources:DeviceID
     Card-Fault                 = Juniper
     Interface-Fault            = MIB2
     Interface-Performance      = MIB2SNMP
     Port-Fault                 = MIB2
     Port-Performance           = MIB2
     Port-Ethernet-Performance  = dot3_Ethernet
}

#Huawei S2720-28TP-EI Switch
.1.3.6.1.4.1.2011.2.23.529 {
    TYPE            =   Switch
    VENDOR          =   Huawei
    MODEL           =   S2720-28TP-EI
    CERTIFICATION   =   CERTIFIED
    CONT            =   Huawei-Entity-Switch 
    HEALTH          =   Huawei-Router
    VLAN            =   Huawei-Vlan-L2
    NEIGHBOR        =   LLDP
  
INSTRUMENTATION:
    CPU/Memory                = HuaweiRouter:DeviceID
    Environment               = HuaweiEntity:DeviceID
    Card-Fault                = HuaweiEntity:DeviceID 
    Interface-Fault           = MIB2
    Interface-Performance     = MIB2
    Port-Fault                = MIB2
    Port-Performance          = MIB2
    Port-Ethernet-Performance = dot3_Ethernet
}

 

check-circle-line exclamation-circle-line close-line
Scroll to top icon