About VMware Smart Assurance IP Manager Certification
Certification is a process by which VMware Inc. ensures that the devices that are managed by the IP Manager are properly represented in the modeled topology, and that the devices are correctly monitored for connectivity and performance analysis. Devices are specific models of systems.
The certification process consists of three major parts:
-
Discovery of the device, including the device’s components (such as cards, ports) and endpoints (such as IP addresses, MAC addresses).
-
Building of Layer 2 (data link) and Layer 3 (network) connectivity.
-
Verification of operational status of the device and its components.
The VMware Smart Assurance IP Manager Certification Matrix available at VMware Online Support (https://docs.vmware.com) identifies the vendor-specific models that are supported by the IP Manager.
Certification Levels
A device may have one of three certification levels:
-
CERTIFIED: VMware has successfully tested a simulation of the device by using standard and proprietary MIBs that are supplied by the vendor. The IP Manager discovers the device by using standard MIB-II data and proprietary MIBs.
-
TEMPLATE: VMware Inc. that the device supports some standard and proprietary MIBs, but Dell has not tested the device. The IP Manager recognizes the object ID (OID), but has no information about the MIBs that this device supports.
-
GENERIC: VMware Inc. does not have the OID for the device. The IP Manager does not recognize the OID and responds by classifying the certification level of the device as GENERIC, adding the device to the Node class, and analyzing the device by using MIB-II data.
Note: A certification level named VALIDATED still appears in the oid2type configuration files but is no longer used. VALIDATED has essentially the same meaning as CERTIFIED.
############################################################################################################################# ## # VERSION HISTORY # # Version | Published Date | Description # 1.0 | February 2022 | First release of the document. Lists 06 simple certifications. # 2.0 | March 2022 | First release of the document. Lists 12 simple certifications. # # # INSTRUCTIONS # # 1. Find the System Object ID (SysOID) of the device you intend to # certify in the list of certified devices. # 2. Copy the device certification code starting from the # device SysOID till the next SysOID (including the braces). # 3. Open the oid2type_Field.conf file using sm_edit and paste the # contents at the end of the file. Then save and close the file. # 4. If the SysOID is already certified and you are looking to apply an # updated certification, use sm_edit to remove the old certification from the # oid2type_/oid2type_misc/oid2type_Field.conf file. # 5. To load new certifications into a domain, run the following command: # /smarts/bin/sm_tpmgr -s --reloadoid # 6. Check IP domain log file for errors. # 7. You can also see the exact certification used for a device in a running server by executing # /smarts/bin/dmctl -s get ICF_TopologyManager::ICF-TopologyManager| grep # # 8. The certifications in this file will be included in the next GA release. # If you install a new GA release (hotfix patch, service pack, minor, or major release), # remove the redundant or duplicate entry from the oid2type_Field.conf file. # # The conf files are located in: # /smarts/conf/discovery and in the # /smarts/local/conf/discovery directory. # Use /smarts/bin/sm_edit to ensure that all modifications are # stored under local and read in by the domain. # ## # The following simple certifications are supported on IP versions: IP 10.1.5.5 # Purpose: This file contains the list of certification code entries that # can be added to the existing oid2type_Field.conf file to enable # discovery and monitoring of the device. ## ## # # SL No TASC SYSOID VENDOR MODEL # # 1 306603 .1.3.6.1.4.1.12356.103.1.2007 FORTINET Fortinet FMG-200G # 2 306590 .1.3.6.1.4.1.30065.1.3011.7060.3741.2.48.1654.6 ARISTA DCS-7060SX2-48YC6 # 3 306572 .1.3.6.1.4.1.30065.1.3011.7010.1958.48 ARISTA DCS-7010TX-48 # 4 306573 .1.3.6.1.4.1.2620.1.6.123.1.103 CHECKPOINT Smart-1-600-S # 5 306571 .1.3.6.1.4.1.25461.2.3.57 PAN PA-5450 # 6 306599 .1.3.6.1.4.1.9.1.2989 CISCO ciscoC83001N1S6T # 7 306602 .1.3.6.1.4.1.12356.101.1.10007 FORTINET Fortinet FG-1101E # 8 306565 .1.3.6.1.4.1.12356.101.1.26001 FORTINET FG-2601F # 9 306600 .1.3.6.1.4.1.25506.11.1.269 HP hpeFF59402Slot # 10 306567 .1.3.6.1.4.1.25049.1.101 OPENGEAR OM2248-L # 11 306570 .1.3.6.1.4.1.11829.2.3.30 CORVILPROBE CNE-7750 # 12 306569 .1.3.6.1.4.1.9.12.3.1.3.2353 CISCO N9K-C93180YC-FX-24 # 13 306593 .1.3.6.1.4.1.9.1.2961 CISCO Catalyst 8200-1N-4T # 14 306595 .1.3.6.1.4.1.11.2.3.7.11.133 HP hpSwitchJ9627A # 15 306594 .1.3.6.1.4.1.9.1.3069 CISCO Catalyst 8500L-8S4X # 16 306589 .1.3.6.1.4.1.19631.1.2.1 ALCATEL Alcatel-Lucent Advanced Communications Server # 17 306623 .1.3.6.1.4.1.30065.1.2546.720.858.48.207.2 ARISTA aristaCCS720XP48ZC2 # 18 306643 .1.3.6.1.4.1.9.1.2683 CISCO ciscoIE32008T2S # #New certifications available in the 1.0 version released in February 2022 #New certifications available in the 2.0 version released in March 2022 # ## #Fortinet FMG-200G Firewall .1.3.6.1.4.1.12356.103.1.2007 { TYPE = Firewall VENDOR = Fortinet MODEL = Fortinet FMG-200G CERTIFICATION = CERTIFIED CONT = Fortinet HOSTRESRCS = MIB2 HEALTH = Fortinet-Health NEIGHBOR = LLDP INSTRUMENTATION: Disk-Fault = HostResources:DeviceID CPU/Memory = Fortinet:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #Arista Networks DCS-7060SX2-48YC6 48x25GbE (SFP+) & 6x100GbE (QSFP+) Ethernet Switch .1.3.6.1.4.1.30065.1.3011.7060.3741.2.48.1654.6 { TYPE = Switch VENDOR = Arista MODEL = DCS-7060SX2-48YC6 CERTIFICATION = CERTIFIED CONT = Arista-Switch HOSTRESRCS = Arista-MIB2 VLAN = AristaDot1q NEIGHBOR = LLDP INSTRUMENTATION: Environment = EntityState:DeviceID Card-Fault = EntityState:DeviceID CPU/Memory = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID Disk-Fault = HostResources:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #Arista Networks DCS-7010TX-48 48-port 1000BASE-T + 4-port SFP28 Switch .1.3.6.1.4.1.30065.1.3011.7010.1958.48 { TYPE = Switch VENDOR = Arista MODEL = DCS-7010TX-48 CERTIFICATION = CERTIFIED CONT = Arista-Switch HOSTRESRCS = Arista-MIB2 VLAN = AristaDot1q NEIGHBOR = LLDP INSTRUMENTATION: Environment = EntityState:DeviceID Card-Fault = EntityState:DeviceID CPU/Memory = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID Disk-Fault = HostResources:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #Checkpoint Smart-1-600-S Firewall .1.3.6.1.4.1.2620.1.6.123.1.103 { TYPE = Firewall VENDOR = CheckPoint MODEL = Smart-1-600-S CERTIFICATION = CERTIFIED CONT = Generic-MIB2 HOSTRESRCS = MIB2-Checkpoint-Other HEALTH = Checkpoint-Firewall NEIGHBOR = LLDP INSTRUMENTATION: Environment = Checkpoint_Firewall:DeviceID Disk-Fault = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID CPU/Memory = Checkpoint:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } # PALO-ALTO-NETWORKS PA-5450 .1.3.6.1.4.1.25461.2.3.57 { TYPE = Firewall VENDOR = PAN MODEL = PA-5450 CERTIFICATION = CERTIFIED CONT = Generic-Router HOSTRESRCS = MIB2 NEIGHBOR = LLDP INSTRUMENTATION: CPU/Memory = HostResources:DeviceID Disk-Fault = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #Cisco ciscoC83001N1S6T Router .1.3.6.1.4.1.9.1.2989 { TYPE = Router VENDOR = Cisco MODEL = ciscoC83001N1S6T CERTIFICATION = CERTIFIED CONT = Cisco-L3Switch HEALTH = Cisco-Router-ASR-EntSensor VLAN = Cisco-Membership NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEntityFRU:DeviceID CPU/Memory = CiscoRouter:DeviceID Card-Fault = CiscoEntityFRU:DeviceID Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #Fortinet FG-1101E Firewall .1.3.6.1.4.1.12356.101.1.10007 { TYPE = Firewall VENDOR = Fortinet MODEL = Fortinet FG-1101E CERTIFICATION = CERTIFIED CONT = Fortinet HEALTH = Fortigate-Health NEIGHBOR = LLDP INSTRUMENTATION: Environment = Fortinet_Fortigate:DeviceID Disk-Fault = Fortigate:DeviceID CPU/Memory = Fortigate:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #Fortinet FG-2601F Firewall .1.3.6.1.4.1.12356.101.1.26001 { TYPE = Firewall VENDOR = Fortinet MODEL = FG-2601F CERTIFICATION = CERTIFIED CONT = Fortinet HEALTH = Fortigate-Health NEIGHBOR = LLDP INSTRUMENTATION: Environment = Fortinet_Fortigate:DeviceID Disk-Fault = Fortigate:DeviceID CPU/Memory = Fortigate:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #HP HPE FF 5940 2-slot Switch .1.3.6.1.4.1.25506.11.1.269 { TYPE = Switch VENDOR = HP MODEL = hpeFF59402Slot CERTIFICATION = CERTIFIED CONT = HP-H3C HEALTH = HP-H3C VLAN = Hp-vlan NEIGHBOR = LLDP INSTRUMENTATION: CPU/Memory = HPH3C:DeviceID Card-Fault = HPH3C:DeviceID Environment = HPH3C:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #OpenGear OM2248-L .1.3.6.1.4.1.25049.1.101 { TYPE = TerminalServer VENDOR = OpenGear MODEL = OM2248-L CERTIFICATION = CERTIFIED CONT = Generic-MIB2 HOSTRESRCS = UCD-Sensor NEIGHBOR = LLDP INSTRUMENTATION: Interface-Fault = MIB2 Interface-Performance = MIB2 Environment = UCD_Sensor:DeviceID CPU/Memory = HostResources:DeviceID Disk-Fault = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID } # CorvilProbe CNE-7750 .1.3.6.1.4.1.11829.2.3.30 { TYPE = Host VENDOR = CorvilProbe MODEL = CNE-7750 CERTIFICATION = CERTIFIED CONT = Generic-MIB2 HOSTRESRCS = MIB2 INSTRUMENTATION: Disk-Fault = HostResources:DeviceID CPU/Memory = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } # CISCO SYSTEM N9K-C93180YC-FX-24 .1.3.6.1.4.1.9.12.3.1.3.2353 { TYPE = Switch VENDOR = Cisco MODEL = N9K-C93180YC-FX-24 CERTIFICATION = CERTIFIED CONT = Cisco-Nexus-NON-CLI HEALTH = Nexus-Entity-EntSensor VLAN = Cisco-Membership NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEntityFRU:DeviceID Card-Fault = CiscoEntityRF:DeviceID CPU/Memory = CiscoNexus:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } # Cisco Catalyst 8200-1N-4T .1.3.6.1.4.1.9.1.2961 { TYPE = Switch VENDOR = Cisco MODEL = Catalyst 8200-1N-4T CERTIFICATION = CERTIFIED CONT = Cisco-L3Switch HEALTH = Cisco-ASR9k-EntSensor VLAN = Cisco-Membership NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEntityFRU:DeviceID CPU/Memory = CiscoRouter:DeviceID Card-Fault = CiscoEntityFRU Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #HP J9627A 2620-48-PoE+ Switch .1.3.6.1.4.1.11.2.3.7.11.133 { TYPE = Switch VENDOR = HP MODEL = hpSwitchJ9627A CERTIFICATION = CERTIFIED CONT = HP-Aruba-Switch HEALTH = HP-Aruba-Switch VLAN = Dot1q NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = HPProCurveJ4SeriesEnvMon:DeviceID CPU/Memory = HPProCurveJ4SeriesEnvMon:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } # Cisco Catalyst 8500L-8S4X .1.3.6.1.4.1.9.1.3069 { TYPE = Switch VENDOR = Cisco MODEL = Catalyst 8500L-8S4X CERTIFICATION = CERTIFIED CONT = Cisco-L3Switch HEALTH = Cisco-ASR9k-EntSensor VLAN = Cisco-Membership NEIGHBOR = LLDP-CDP INSTRUMENTATION: Environment = CiscoEntityFRU:DeviceID CPU/Memory = CiscoRouter:DeviceID Card-Fault = CiscoEntityFRU Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } # Alcatel-Lucent Advanced Communications Server .1.3.6.1.4.1.19631.1.2.1 { TYPE = Host VENDOR = Alcatel MODEL = Alcatel-Lucent Advanced Communications Server CERTIFICATION = CERTIFIED CONT = Generic-MIB2 HOSTRESRCS = MIB2 INSTRUMENTATION: Disk-Fault = HostResources:DeviceID CPU/Memory = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 } #Arista Networks CCS-720XP-48ZC2 Switch .1.3.6.1.4.1.30065.1.2546.720.858.48.207.2 { TYPE = Switch VENDOR = Arista MODEL = aristaCCS720XP48ZC2 CERTIFICATION = CERTIFIED CONT = Arista-Switch HOSTRESRCS = Arista-MIB2 VLAN = AristaDot1q NEIGHBOR = LLDP INSTRUMENTATION: Environment = EntityState:DeviceID Card-Fault = EntityState:DeviceID CPU/Memory = HostResources:DeviceID FileSystem-Performance = HostResources:DeviceID Disk-Fault = HostResources:DeviceID Interface-Fault = MIB2 Interface-Performance = MIB2 Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet } #Cisco Catalyst IE-3200-8T2S Rugged Switch .1.3.6.1.4.1.9.1.2683 { TYPE = Switch VENDOR = Cisco MODEL = ciscoIE32008T2S CERTIFICATION = CERTIFIED CONT = Cisco-L3Switch HEALTH = Cisco-Catalyst6832 VLAN = Cisco-Membership NEIGHBOR = LLDP-CDP INSTRUMENTATION: Card-Fault = CiscoEntityFRU:DeviceID Environment = CiscoStack CPU/Memory = CiscoSwitch:DeviceID Interface-Fault = MIB2 Interface-Performance = CiscoRouter Interface-Ethernet-Performance = CiscoRouter_Ethernet Port-Fault = MIB2 Port-Performance = MIB2 Port-Ethernet-Performance = dot3_Ethernet }