About VMware Smart Assurance IP Manager Certification

Certification is a process by which VMware Inc. ensures that the devices that are managed by the IP Manager are properly represented in the modeled topology, and that the devices are correctly monitored for connectivity and performance analysis. Devices are specific models of systems.

The certification process consists of three major parts:

  • Discovery of the device, including the device’s components (such as cards, ports) and endpoints (such as IP addresses, MAC addresses). 

  • Building of Layer 2 (data link) and Layer 3 (network) connectivity. 

  • Verification of operational status of the device and its components.

The VMware Smart Assurance IP Manager Certification Matrix available at VMware Online Support (https://docs.vmware.com) identifies the vendor-specific models that are supported by the IP Manager.

Certification Levels

 A device may have one of three certification levels: 

  • CERTIFIED: VMware has successfully tested a simulation of the device by using standard and proprietary MIBs that are supplied by the vendor. The IP Manager discovers the device by using standard MIB-II data and proprietary MIBs.

  • TEMPLATE: VMware Inc. that the device supports some standard and proprietary MIBs, but Dell has not tested the device. The IP Manager recognizes the object ID (OID), but has no information about the MIBs that this device supports.

  • GENERIC: VMware Inc. does not have the OID for the device. The IP Manager does not recognize the OID and responds by classifying the certification level of the device as GENERIC, adding the device to the Node class, and analyzing the device by using MIB-II data.

Note: A certification level named VALIDATED still appears in the oid2type configuration files but is no longer used. VALIDATED has essentially the same meaning as CERTIFIED.

#############################################################################################################################
##
# VERSION HISTORY
#
# Version | Published Date   | Description
# 1.0     | November 2021    | First release of the document. Lists 09 simple certifications.
# 2.0     | December 2021    | Second release of the document. Lists 11 simple certifications.
# 
#
# INSTRUCTIONS
#
# 1. Find the System Object ID (SysOID) of the device you intend to
# certify in the list of certified devices.
# 2. Copy the device certification code starting from the
# device SysOID till the next SysOID (including the braces).
# 3. Open the oid2type_Field.conf file using sm_edit and paste the
# contents at the end of the file. Then save and close the file.
# 4. If the SysOID is already certified and you are looking to apply an
# updated certification, use sm_edit to remove the old certification from the
# oid2type_/oid2type_misc/oid2type_Field.conf file.
# 5. To load new certifications into a domain, run the following command:
# /smarts/bin/sm_tpmgr -s  --reloadoid
# 6. Check IP domain log file for errors.
# 7. You can also see the exact certification used for a device in a running server by executing
# /smarts/bin/dmctl -s  get ICF_TopologyManager::ICF-TopologyManager| grep
#
# 8. The certifications in this file will be included in the next GA release.
# If you install a new GA release (hotfix patch, service pack, minor, or major release),
# remove the redundant or duplicate entry from the oid2type_Field.conf file.
#
# The conf files are located in:
# /smarts/conf/discovery and in the
# /smarts/local/conf/discovery directory.
# Use /smarts/bin/sm_edit to ensure that all modifications are
# stored under local and read in by the domain.
#
##
# The following simple certifications are supported on IP versions: IP 10.1.5.4
# Purpose: This file contains the list of certification code entries that
# can be added to the existing oid2type_Field.conf file to enable
# discovery and monitoring of the device.
##
##
#
#   SL No   TASC        SYSOID                                             VENDOR         MODEL
#
#    1     306516      .1.3.6.1.4.1.12356.101.1.80008                      FORTINET       FortiGate-VM64-KVM
#    2     306555      .1.3.6.1.4.1.9.1.1411                               CISCO          ciscoASA5512sc
#    3     306518      .1.3.6.1.4.1.12356.101.1.18000                      FORTINET       FortiGate-2200E
#    4     306535      .1.3.6.1.4.1.207.1.4.87                             ALLIEDTELESIS  at-8088-SC
#    5     306547      .1.3.6.1.4.1.9.1.2759                               CISCO          ciscoC11278PLteP
#    6     306559      .1.3.6.1.4.1.12356.101.1.845                        FORTINET       FortiGate 80F
#    7     306481      .1.3.6.1.4.1.12356.101.1.10006                      FORTINET       FortiGate-1100E
#    8     306557      .1.3.6.1.4.1.12356.109.1.10030                      FORTINET       FortiProxyVM64
#    9     306513      .1.3.6.1.4.1.12356.101.1.34001                      FORTINET       FortiGate-3400E
#    10    306469      .1.3.6.1.4.1.7779.1.1525                            INFOBLOX       IB-4025 
#    11    306485      .1.3.6.1.4.1.2620.1.6.123.1.4002                    CHECKPOINT     MHO-175 
#    12    306509      .1.3.6.1.4.1.2636.1.1.1.4.82.24                     JUNIPER        jnxProductQFX512032C 
#    13    306521      .1.3.6.1.4.1.30065.1.3011.7050.2733.3.972.32.3282   ARISTA         DCS-7050CX3M-32S 
#    14    306460      .1.3.6.1.4.1.3417.1.1.30                            BLUECOAT       sgvmwareesx 
#    15    306523      .1.3.6.1.4.1.9.1.2850                               CISCO          ciscoC9120AXME 
#    16    306504      .1.3.6.1.4.1.5551.3.27                              ADVA           OSA 5422 
#    17    306526      .1.3.6.1.4.1.2636.1.1.1.2.116                       JUNIPER        jnxProductNameACX2100 
#    18    306508      .1.3.6.1.4.1.6486.801.1.1.2.1.11.1.5                ALCATEL        OmniSwitch6860E-24 
#    19    306507      .1.3.6.1.4.1.9.1.3008                               CISCO          IE-3300-8U2X 
#    20    306466      .1.3.6.1.4.1.30065.1.7368                           ARISTA         DCS-7368 
#    
#
#New certifications available in the 1.0 version released in November 2021
#New certifications available in the 2.0 version released in December 2021
##

#Fortinet  FortiGate-VM64-KVM
.1.3.6.1.4.1.12356.101.1.80008 {
    TYPE          = Firewall
    VENDOR        = Fortinet
    MODEL         = FortiGate-VM64-KVM 
    CERTIFICATION = CERTIFIED
    CONT          = Fortinet
    HEALTH        = Fortigate-Health
    NEIGHBOR      = LLDP
    
INSTRUMENTATION:
    Disk-Fault            = Fortigate:DeviceID
    Environment           = Fortinet_Fortigate:DeviceID
    CPU/Memory            = Fortigate:DeviceID
    Interface-Fault       = MIB2
    Interface-Performance = MIB2
}
#Cisco Adaptive Security Appliance
.1.3.6.1.4.1.9.1.1411 {
    TYPE                = Firewall
    VENDOR              = Cisco
    MODEL               = ciscoASA5512sc
    CERTIFICATION       = CERTIFIED
    CONT                = Cisco-Router
    HEALTH              = Cisco-Router
    NEIGHBOR            = LLDP-CDP 

INSTRUMENTATION:
    CPU/Memory                          = CiscoRouter:DeviceID
    Interface-Fault                     = MIB2
    Interface-Performance               = CiscoRouter
    Interface-Ethernet-Performance      = CiscoRouter_Ethernet
}
#Fortinet  FortiGate-2200E
.1.3.6.1.4.1.12356.101.1.18000 {
    TYPE          = Firewall
    VENDOR        = Fortinet
    MODEL         = FortiGate-2200E 
    CERTIFICATION = CERTIFIED
    CONT          = Fortinet
    HEALTH        = Fortigate-Health
    NEIGHBOR      = LLDP
    
INSTRUMENTATION:
    Disk-Fault            = Fortigate:DeviceID
    Environment           = Fortinet_Fortigate:DeviceID
    CPU/Memory            = Fortigate:DeviceID
    Interface-Fault       = MIB2
    Interface-Performance = MIB2
}
#Allied Telesis at-8088-SC Switch
.1.3.6.1.4.1.207.1.4.87 {
    TYPE             = Switch
    VENDOR           = AlliedTelesis
    MODEL            = at-8088-SC
    CERTIFICATION    = CERTIFIED
    CONT             = Generic-Bridge
    HEALTH           = Allied-Telesyn-health
    VLAN             = Allied-Tel

INSTRUMENTATION:
    CPU/Memory                   = AlliedTelesyn:DeviceID
    Environment                  = AlliedTelesynEnvMon:DeviceID
    Interface-Fault              = MIB2
    Interface-Performance        = MIB2
    Port-Fault                   = MIB2
    Port-Performance             = MIB2
    Port-Ethernet-Performance    = dot3_Ethernet
}
#Cisco ciscoC11278PLteP Router
.1.3.6.1.4.1.9.1.2759 {  
    TYPE             = Router 
    VENDOR           = Cisco 
    MODEL            = ciscoC11278PLteP
    CERTIFICATION    = CERTIFIED 
    CONT             = Cisco-L3Switch 
    HEALTH           = Cisco-Router-ASR-EntSensor
    VLAN             = Cisco-Membership
    NEIGHBOR         = LLDP-CDP
    
INSTRUMENTATION:  
    Environment                     = CiscoEntityFRU:DeviceID  
    CPU/Memory                      = CiscoRouter:DeviceID  
    Card-Fault                      = CiscoEntityFRU:DeviceID  
    Interface-Fault                 = MIB2
    Interface-Performance           = CiscoRouter
    Interface-Ethernet-Performance  = CiscoRouter_Ethernet
    Port-Fault                      = MIB2   
    Port-Performance                = MIB2   
    Port-Ethernet-Performance       = dot3_Ethernet
}
#Fortinet FortiGate 80F Firewall
.1.3.6.1.4.1.12356.101.1.845 {
    TYPE          = Firewall
    VENDOR        = Fortinet
    MODEL         = FortiGate 80F 
    CERTIFICATION = CERTIFIED
    CONT          = Fortinet
    HEALTH        = Fortigate-Health
    NEIGHBOR      = LLDP
    
INSTRUMENTATION:
    Environment           = Fortinet_Fortigate:DeviceID
    Disk-Fault            = Fortigate:DeviceID
    CPU/Memory            = Fortigate:DeviceID
    Interface-Fault       = MIB2
    Interface-Performance = MIB2
}
#Fortinet  FG-1100E
.1.3.6.1.4.1.12356.101.1.10006 {
    TYPE          = Firewall
    VENDOR        = Fortinet
    MODEL         = FortiGate-1100E
    CERTIFICATION = CERTIFIED
    CONT          = Fortinet
    HEALTH        = Fortigate-Health
    NEIGHBOR      = LLDP
    
INSTRUMENTATION:
    Disk-Fault            = Fortigate:DeviceID
    Environment           = Fortinet_Fortigate:DeviceID
    CPU/Memory            = Fortigate:DeviceID
    Interface-Fault       = MIB2
    Interface-Performance = MIB2
}
#Fortinet FortiProxyVM64 Firewall
.1.3.6.1.4.1.12356.109.1.10030 {
    TYPE          = Firewall
    VENDOR        = Fortinet
    MODEL         = FortiProxyVM64 
    CERTIFICATION = CERTIFIED
    CONT          = Fortinet
    HEALTH        = Fortigate-Health
    NEIGHBOR      = LLDP
    
INSTRUMENTATION:
    Environment           = Fortinet_Fortigate:DeviceID
    Disk-Fault            = Fortigate:DeviceID
    CPU/Memory            = Fortigate:DeviceID
    Interface-Fault       = MIB2
    Interface-Performance = MIB2
}
#Fortinet  FG-3400E
.1.3.6.1.4.1.12356.101.1.34001 {
    TYPE          = Firewall
    VENDOR        = Fortinet
    MODEL         = FortiGate-3400E
    CERTIFICATION = CERTIFIED
    CONT          = Fortinet
    HEALTH        = Fortigate-Health
    NEIGHBOR      = LLDP
    
INSTRUMENTATION:
    Disk-Fault            = Fortigate:DeviceID
    Environment           = Fortinet_Fortigate:DeviceID
    CPU/Memory            = Fortigate:DeviceID
    Interface-Fault       = MIB2
    Interface-Performance = MIB2
}
#Infoblox IB-4025
.1.3.6.1.4.1.7779.1.1525 {              
    TYPE              = Host
    VENDOR            = Infoblox
    MODEL             = IB-4025
    CERTIFICATION     = CERTIFIED
    CONT              = Generic-MIB2
    HOSTRESRCS        = Infoblox-MIB2-Selector
    HEALTH            = Infoblox
    NEIGHBOR          = LLDP

INSTRUMENTATION:
    CPU/Memory              = Infoblox:DeviceID
    Disk-Fault              = HostResources:DeviceID
    FileSystem-Performance  = HostResources:DeviceID
    Environment             = Infoblox:DeviceID
    Interface-Fault         = MIB2
    Interface-Performance   = MIB2
    Port-Fault              = MIB2
    Port-Performance        = MIB2
}
#Checkpoint MHO-175 Firewall
.1.3.6.1.4.1.2620.1.6.123.1.4002 {
    TYPE                             = Firewall
    VENDOR                           = CheckPoint
    MODEL                            = MHO-175
    CERTIFICATION                    = CERTIFIED
    CONT                             = Generic-MIB2
    HOSTRESRCS                       = MIB2-Checkpoint-Other
    HEALTH                           = Checkpoint-Firewall
    NEIGHBOR                         = LLDP
              
INSTRUMENTATION:
    Environment                      = Checkpoint_Firewall:DeviceID
    Disk-Fault                       = HostResources:DeviceID
    FileSystem-Performance           = HostResources:DeviceID
    CPU/Memory                       = Checkpoint:DeviceID
    Interface-Fault                  = MIB2
    Interface-Performance            = MIB2
}
# Juniper jnxProductQFX512032C Switch
.1.3.6.1.4.1.2636.1.1.1.4.82.24 {
    TYPE             = Switch
    VENDOR           = Juniper
    MODEL            = jnxProductQFX512032C
    CERTIFICATION    = CERTIFIED
    CONT             = Juniper-EX-Series
    HEALTH           = Juniper-EX8208
    HOSTRESRCS       = Juniper-MIB2
    VLAN             = Dot1q
    NEIGHBOR         = LLDP-ATM-Peer

 INSTRUMENTATION:
    Environment                 = JuniperEnvMon:DeviceID
    CPU/Memory                  = JuniperRouter:DeviceID
    FileSystem-Performance      = HostResources:DeviceID
    Disk-Fault                  = HostResources:DeviceID
    Card-Fault                  = Juniper
    Interface-Fault             = MIB2
    Interface-Performance       = MIB2SNMP
    Port-Fault                  = MIB2
    Port-Performance            = MIB2
    Port-Ethernet-Performance   = dot3_Ethernet
}
#Arista Networks DCS-7050CX3M-32S Switch
.1.3.6.1.4.1.30065.1.3011.7050.2733.3.972.32.3282 {
    TYPE                     = Switch
    VENDOR                   = Arista
    MODEL                    = DCS-7050CX3M-32S
    CERTIFICATION            = CERTIFIED
    CONT                     = Arista-Switch
    HOSTRESRCS               = Arista-MIB2
    VLAN                     = AristaDot1q
    NEIGHBOR                 = LLDP
   
INSTRUMENTATION:
    Environment                  = EntityState:DeviceID
    Card-Fault                   = EntityState:DeviceID
    CPU/Memory                   = HostResources:DeviceID
    FileSystem-Performance       = HostResources:DeviceID
    Disk-Fault                   = HostResources:DeviceID
    Interface-Fault              = MIB2
    Interface-Performance        = MIB2
    Port-Fault                   = MIB2
    Port-Performance             = MIB2
    Port-Ethernet-Performance    = dot3_Ethernet
}
# Blue Coat SGVMWARE-ESX
.1.3.6.1.4.1.3417.1.1.30 {
    TYPE          = Host
    VENDOR        = Blue-Coat
    MODEL         = sgvmwareesx
    CERTIFICATION = CERTIFIED
    CONT          = Generic-MIB2
    HOSTRESRCS    = BLUECOAT
    HEALTH        = BlueCoat-Health
    NEIGHBOR      = LLDP

INSTRUMENTATION:
    Environment           = BluecoatEnvMon:DeviceID
    CPU/Memory            = BluecoatRsc:DeviceID
    Disk-Fault            = BluecoatRsc:DeviceID
    Interface-Fault       = MIB2
    Interface-Performance = MIB2
}
#Cisco ciscoC9120AXME
.1.3.6.1.4.1.9.1.2850 {
    TYPE            = WirelessController
    VENDOR          = Cisco
    MODEL           = ciscoC9120AXME
    CERTIFICATION   = CERTIFIED
    CONT            = Cisco-L3Switch
    HEALTH          = Cisco-Router-CRS-EntSensor
    WIFI            = Cisco-Wireless
    BRIDGE          = Cisco
    VLAN            = Cisco-Membership
    NEIGHBOR        = LLDP-CDP
    
 INSTRUMENTATION:
    Card-Fault                      = CiscoEntityFRU
    Environment                     = CiscoEntityFRU:DeviceID
    CPU/Memory                      = CiscoRouter:DeviceID
    Interface-Fault                 = MIB2
    Interface-Performance           = CiscoRouter
    Interface-Ethernet-Performance  = CiscoRouter_Ethernet
    Port-Fault                      = MIB2
    Port-Performance                = MIB2
    Port-Ethernet-Performance       = dot3_Ethernet
    WirelessAccessPoint-Fault       = Cisco_AireSpace_Wireless_MIB
    WirelessClient-Fault            = Cisco_Lwapp
    WirelessController-Performance  = Cisco_Airespace_Switching
    AuthenticationServer-Fault      = Cisco_Airespace_Wireless_MIB
}
# Adva OSA 5422
.1.3.6.1.4.1.5551.3.27 {
    TYPE             = Switch
    VENDOR           = Adva
    MODEL            = OSA 5422
    CERTIFICATION    = CERTIFIED
    CONT             = Adva-FSP150
    HEALTH           = Adva-FSP150
    VLAN             = Dot1q
    NEIGHBOR         = LLDP

INSTRUMENTATION:
    Environment               = Adva_FSP150:DeviceID
    Card-Fault                = Adva_Ethernet
    Interface-Fault           = MIB2
    Interface-Performance     = MIB2
    Port-Fault                = MIB2
    Port-Performance          = MIB2
    Port-Ethernet-Performance = dot3_Ethernet
}
#Juniper jnxProductNameACX2100 Router
.1.3.6.1.4.1.2636.1.1.1.2.116 {
    TYPE             = Router
    VENDOR           = Juniper
    MODEL            = jnxProductNameACX2100
    CERTIFICATION    = CERTIFIED
    CONT             = Juniper-Chassis
    HEALTH           = Juniper-EX8208
    HOSTRESRCS       = Juniper-MIB2
    VLAN             = Juniper-Vlan-Mib
    NEIGHBOR         = LLDP

INSTRUMENTATION:
    Environment             = JuniperEnvMon:DeviceID
    CPU/Memory              = JuniperRouter:DeviceID
    FileSystem-Performance  = HostResources:DeviceID
    Disk-Fault              = HostResources:DeviceID
    Card-Fault              = Juniper
    Interface-Fault         = MIB2
    Interface-Performance   = MIB2SNMP
}
# Alcatel OmniSwitch 6860E-24
.1.3.6.1.4.1.6486.801.1.1.2.1.11.1.5 {
    TYPE          = Switch
    VENDOR        = Alcatel
    MODEL         = OmniSwitch6860E-24
    CERTIFICATION = CERTIFIED
    CONT          = Omniswitch-Card801
    VLAN          = Alcatel801
    HEALTH        = OmniSwitch6850-Health801
    NEIGHBOR      = LLDP

INSTRUMENTATION:
    Card-Fault                  = AlcatelOmni_801
    Environment                 = AlcatelOmni_801:DeviceID
    CPU/Memory                  = AlcatelOmni_801:DeviceID
    Interface-Fault             = MIB2
    Interface-Performance       = MIB2
    Port-Fault                  = MIB2
    Port-Performance            = MIB2
}
# Cisco IE-3300-8U2X Switch
.1.3.6.1.4.1.9.1.3008 {  
    TYPE             = Switch 
    VENDOR           = Cisco 
    MODEL            = IE-3300-8U2X  
    CERTIFICATION    = CERTIFIED
    CONT             = Cisco-L3Switch 
    HEALTH           = Cisco-Catalyst6832
    VLAN             = Cisco-Membership 
    NEIGHBOR         = LLDP-CDP
    
INSTRUMENTATION:  
    Card-Fault                      = CiscoEntityFRU:DeviceID   
    Environment                     = CiscoStack  
    CPU/Memory                      = CiscoSwitch:DeviceID  
    Interface-Fault                 = MIB2
    Interface-Performance           = CiscoRouter
    Interface-Ethernet-Performance  = CiscoRouter_Ethernet
    Port-Fault                      = MIB2   
    Port-Performance                = MIB2   
    Port-Ethernet-Performance       = dot3_Ethernet
}
#Arista Networks DCS-7368 Switch
.1.3.6.1.4.1.30065.1.7368 {
    TYPE                     = Switch
    VENDOR                   = Arista
    MODEL                    = DCS-7368
    CERTIFICATION            = CERTIFIED
    CONT                     = Arista-Switch
    HOSTRESRCS               = Arista-MIB2
    VLAN                     = AristaDot1q
    NEIGHBOR                 = LLDP
   
INSTRUMENTATION:
    Environment                  = EntityState:DeviceID
    Card-Fault                   = EntityState:DeviceID
    CPU/Memory                   = HostResources:DeviceID
    FileSystem-Performance       = HostResources:DeviceID
    Disk-Fault                   = HostResources:DeviceID
    Interface-Fault              = MIB2
    Interface-Performance        = MIB2
    Port-Fault                   = MIB2
    Port-Performance             = MIB2
    Port-Ethernet-Performance    = dot3_Ethernet
}
 

 

check-circle-line exclamation-circle-line close-line
Scroll to top icon