About VMware Smart Assurance IP Manager Certification

Certification is a process by which VMware Inc. ensures that the devices that are managed by the IP Manager are properly represented in the modeled topology, and that the devices are correctly monitored for connectivity and performance analysis. Devices are specific models of systems.

The certification process consists of three major parts:

  • Discovery of the device, including the device’s components (such as cards, ports) and endpoints (such as IP addresses, MAC addresses). 

  • Building of Layer 2 (data link) and Layer 3 (network) connectivity. 

  • Verification of operational status of the device and its components.

The VMware Smart Assurance IP Manager Certification Matrix available at VMware Online Support (https://docs.vmware.com) identifies the vendor-specific models that are supported by the IP Manager.

Certification Levels

 A device may have one of three certification levels: 

  • CERTIFIED: VMware has successfully tested a simulation of the device by using standard and proprietary MIBs that are supplied by the vendor. The IP Manager discovers the device by using standard MIB-II data and proprietary MIBs.

  • TEMPLATE: VMware Inc. that the device supports some standard and proprietary MIBs, but Dell has not tested the device. The IP Manager recognizes the object ID (OID), but has no information about the MIBs that this device supports.

  • GENERIC: VMware Inc. does not have the OID for the device. The IP Manager does not recognize the OID and responds by classifying the certification level of the device as GENERIC, adding the device to the Node class, and analyzing the device by using MIB-II data.

Note: A certification level named VALIDATED still appears in the oid2type configuration files but is no longer used. VALIDATED has essentially the same meaning as CERTIFIED.

#############################################################################################################################
##
# VERSION HISTORY
#
# Version | Published Date   | Description
# 1.0     | February 2022    | First release of the document. Lists 06 simple certifications.
# 2.0     | March 2022       | First release of the document. Lists 12 simple certifications. 
# 
#
# INSTRUCTIONS
#
# 1. Find the System Object ID (SysOID) of the device you intend to
# certify in the list of certified devices.
# 2. Copy the device certification code starting from the
# device SysOID till the next SysOID (including the braces).
# 3. Open the oid2type_Field.conf file using sm_edit and paste the
# contents at the end of the file. Then save and close the file.
# 4. If the SysOID is already certified and you are looking to apply an
# updated certification, use sm_edit to remove the old certification from the
# oid2type_/oid2type_misc/oid2type_Field.conf file.
# 5. To load new certifications into a domain, run the following command:
# /smarts/bin/sm_tpmgr -s  --reloadoid
# 6. Check IP domain log file for errors.
# 7. You can also see the exact certification used for a device in a running server by executing
# /smarts/bin/dmctl -s  get ICF_TopologyManager::ICF-TopologyManager| grep
#
# 8. The certifications in this file will be included in the next GA release.
# If you install a new GA release (hotfix patch, service pack, minor, or major release),
# remove the redundant or duplicate entry from the oid2type_Field.conf file.
#
# The conf files are located in:
# /smarts/conf/discovery and in the
# /smarts/local/conf/discovery directory.
# Use /smarts/bin/sm_edit to ensure that all modifications are
# stored under local and read in by the domain.
#
##
# The following simple certifications are supported on IP versions: IP 10.1.5.5
# Purpose: This file contains the list of certification code entries that
# can be added to the existing oid2type_Field.conf file to enable
# discovery and monitoring of the device.
##
##
#
#   SL No   TASC        SYSOID                                          VENDOR       MODEL
#
#    1     306603      .1.3.6.1.4.1.12356.103.1.2007                    FORTINET     Fortinet FMG-200G
#    2     306590      .1.3.6.1.4.1.30065.1.3011.7060.3741.2.48.1654.6  ARISTA       DCS-7060SX2-48YC6 
#    3     306572      .1.3.6.1.4.1.30065.1.3011.7010.1958.48           ARISTA       DCS-7010TX-48 
#    4     306573      .1.3.6.1.4.1.2620.1.6.123.1.103                  CHECKPOINT   Smart-1-600-S 
#    5     306571      .1.3.6.1.4.1.25461.2.3.57                        PAN          PA-5450 
#    6     306599      .1.3.6.1.4.1.9.1.2989                            CISCO        ciscoC83001N1S6T 
#    7     306602      .1.3.6.1.4.1.12356.101.1.10007                   FORTINET     Fortinet FG-1101E
#    8     306565      .1.3.6.1.4.1.12356.101.1.26001                   FORTINET     FG-2601F
#    9     306600      .1.3.6.1.4.1.25506.11.1.269                      HP           hpeFF59402Slot
#    10    306567      .1.3.6.1.4.1.25049.1.101                         OPENGEAR     OM2248-L
#    11    306570      .1.3.6.1.4.1.11829.2.3.30                        CORVILPROBE  CNE-7750
#    12    306569      .1.3.6.1.4.1.9.12.3.1.3.2353                     CISCO        N9K-C93180YC-FX-24
#    13    306593      .1.3.6.1.4.1.9.1.2961                            CISCO        Catalyst 8200-1N-4T
#    14    306595      .1.3.6.1.4.1.11.2.3.7.11.133                     HP           hpSwitchJ9627A
#    15    306594      .1.3.6.1.4.1.9.1.3069                            CISCO        Catalyst 8500L-8S4X
#    16    306589      .1.3.6.1.4.1.19631.1.2.1                         ALCATEL      Alcatel-Lucent Advanced Communications Server 
#    17    306623      .1.3.6.1.4.1.30065.1.2546.720.858.48.207.2       ARISTA       aristaCCS720XP48ZC2
#    18    306643      .1.3.6.1.4.1.9.1.2683                            CISCO        ciscoIE32008T2S 
#
#New certifications available in the 1.0 version released in February 2022
#New certifications available in the 2.0 version released in March 2022 
#
##

#Fortinet FMG-200G Firewall
.1.3.6.1.4.1.12356.103.1.2007 { 
    TYPE                    = Firewall 
    VENDOR                  = Fortinet 
    MODEL                   = Fortinet FMG-200G
    CERTIFICATION           = CERTIFIED 
    CONT                    = Fortinet 
    HOSTRESRCS              = MIB2
    HEALTH                  = Fortinet-Health
    NEIGHBOR                = LLDP
    
INSTRUMENTATION:
    Disk-Fault              = HostResources:DeviceID
    CPU/Memory              = Fortinet:DeviceID
    Interface-Fault         = MIB2 
    Interface-Performance   = MIB2
}
#Arista Networks DCS-7060SX2-48YC6 48x25GbE (SFP+) & 6x100GbE (QSFP+) Ethernet Switch
.1.3.6.1.4.1.30065.1.3011.7060.3741.2.48.1654.6 {
    TYPE                     = Switch
    VENDOR                   = Arista
    MODEL                    = DCS-7060SX2-48YC6
    CERTIFICATION            = CERTIFIED
    CONT                     = Arista-Switch
    HOSTRESRCS               = Arista-MIB2
    VLAN                     = AristaDot1q
    NEIGHBOR                 = LLDP
   
INSTRUMENTATION:
    Environment                  = EntityState:DeviceID
    Card-Fault                   = EntityState:DeviceID
    CPU/Memory                   = HostResources:DeviceID
    FileSystem-Performance       = HostResources:DeviceID
    Disk-Fault                   = HostResources:DeviceID
    Interface-Fault              = MIB2
    Interface-Performance        = MIB2
    Port-Fault                   = MIB2
    Port-Performance             = MIB2
    Port-Ethernet-Performance    = dot3_Ethernet
}
#Arista Networks DCS-7010TX-48 48-port 1000BASE-T + 4-port SFP28 Switch
.1.3.6.1.4.1.30065.1.3011.7010.1958.48 {
    TYPE                     = Switch
    VENDOR                   = Arista
    MODEL                    = DCS-7010TX-48
    CERTIFICATION            = CERTIFIED
    CONT                     = Arista-Switch
    HOSTRESRCS               = Arista-MIB2
    VLAN                     = AristaDot1q
    NEIGHBOR                 = LLDP
   
INSTRUMENTATION:
    Environment                  = EntityState:DeviceID
    Card-Fault                   = EntityState:DeviceID
    CPU/Memory                   = HostResources:DeviceID
    FileSystem-Performance       = HostResources:DeviceID
    Disk-Fault                   = HostResources:DeviceID
    Interface-Fault              = MIB2
    Interface-Performance        = MIB2
    Port-Fault                   = MIB2
    Port-Performance             = MIB2
    Port-Ethernet-Performance    = dot3_Ethernet
}
#Checkpoint Smart-1-600-S Firewall
.1.3.6.1.4.1.2620.1.6.123.1.103 {
    TYPE                             = Firewall
    VENDOR                           = CheckPoint
    MODEL                            = Smart-1-600-S
    CERTIFICATION                    = CERTIFIED
    CONT                             = Generic-MIB2
    HOSTRESRCS                       = MIB2-Checkpoint-Other
    HEALTH                           = Checkpoint-Firewall
    NEIGHBOR                         = LLDP
              
INSTRUMENTATION:
    Environment                      = Checkpoint_Firewall:DeviceID
    Disk-Fault                       = HostResources:DeviceID
    FileSystem-Performance           = HostResources:DeviceID
    CPU/Memory                       = Checkpoint:DeviceID
    Interface-Fault                  = MIB2
    Interface-Performance            = MIB2
}
# PALO-ALTO-NETWORKS PA-5450
.1.3.6.1.4.1.25461.2.3.57 {
    TYPE             = Firewall
    VENDOR           = PAN
    MODEL            = PA-5450
    CERTIFICATION    = CERTIFIED
    CONT             = Generic-Router
    HOSTRESRCS       = MIB2
    NEIGHBOR         = LLDP
    
INSTRUMENTATION:
    CPU/Memory              = HostResources:DeviceID
    Disk-Fault              = HostResources:DeviceID
    FileSystem-Performance  = HostResources:DeviceID
    Interface-Fault         = MIB2
    Interface-Performance   = MIB2
}
#Cisco ciscoC83001N1S6T Router
.1.3.6.1.4.1.9.1.2989 {  
    TYPE             = Router 
    VENDOR           = Cisco 
    MODEL            = ciscoC83001N1S6T
    CERTIFICATION    = CERTIFIED 
    CONT             = Cisco-L3Switch 
    HEALTH           = Cisco-Router-ASR-EntSensor
    VLAN             = Cisco-Membership
    NEIGHBOR         = LLDP-CDP
    
INSTRUMENTATION:  
    Environment                     = CiscoEntityFRU:DeviceID  
    CPU/Memory                      = CiscoRouter:DeviceID  
    Card-Fault                      = CiscoEntityFRU:DeviceID  
    Interface-Fault                 = MIB2
    Interface-Performance           = CiscoRouter
    Interface-Ethernet-Performance  = CiscoRouter_Ethernet
    Port-Fault                      = MIB2   
    Port-Performance                = MIB2   
    Port-Ethernet-Performance       = dot3_Ethernet
}
#Fortinet FG-1101E Firewall
.1.3.6.1.4.1.12356.101.1.10007 {
    TYPE          = Firewall
    VENDOR        = Fortinet
    MODEL         = Fortinet FG-1101E 
    CERTIFICATION = CERTIFIED
    CONT          = Fortinet
    HEALTH        = Fortigate-Health
    NEIGHBOR      = LLDP
    
INSTRUMENTATION:
    Environment           = Fortinet_Fortigate:DeviceID
    Disk-Fault            = Fortigate:DeviceID
    CPU/Memory            = Fortigate:DeviceID
    Interface-Fault       = MIB2
    Interface-Performance = MIB2
}
#Fortinet FG-2601F Firewall
.1.3.6.1.4.1.12356.101.1.26001 { 
    TYPE                    = Firewall 
    VENDOR                  = Fortinet 
    MODEL                   = FG-2601F
    CERTIFICATION           = CERTIFIED 
    CONT                    = Fortinet
    HEALTH                  = Fortigate-Health
    NEIGHBOR                = LLDP
    
INSTRUMENTATION:
    Environment             = Fortinet_Fortigate:DeviceID
    Disk-Fault              = Fortigate:DeviceID
    CPU/Memory              = Fortigate:DeviceID
    Interface-Fault         = MIB2 
    Interface-Performance   = MIB2
}
#HP HPE FF 5940 2-slot Switch
.1.3.6.1.4.1.25506.11.1.269 {
    TYPE             = Switch
    VENDOR           = HP
    MODEL            = hpeFF59402Slot
    CERTIFICATION    = CERTIFIED
    CONT             = HP-H3C
    HEALTH           = HP-H3C
    VLAN             = Hp-vlan
    NEIGHBOR         = LLDP

INSTRUMENTATION:
    CPU/Memory                  = HPH3C:DeviceID
    Card-Fault                  = HPH3C:DeviceID
    Environment                 = HPH3C:DeviceID
    Interface-Fault             = MIB2
    Interface-Performance       = MIB2
    Port-Fault                  = MIB2
    Port-Performance            = MIB2
    Port-Ethernet-Performance   = dot3_Ethernet
}
#OpenGear OM2248-L
.1.3.6.1.4.1.25049.1.101 {
    TYPE            = TerminalServer
    VENDOR          = OpenGear
    MODEL           = OM2248-L
    CERTIFICATION   = CERTIFIED
    CONT            = Generic-MIB2
    HOSTRESRCS      = UCD-Sensor
    NEIGHBOR        = LLDP
    
INSTRUMENTATION:
    Interface-Fault         = MIB2
    Interface-Performance   = MIB2
    Environment             = UCD_Sensor:DeviceID
    CPU/Memory              = HostResources:DeviceID
    Disk-Fault              = HostResources:DeviceID    
    FileSystem-Performance  = HostResources:DeviceID
}
# CorvilProbe CNE-7750
.1.3.6.1.4.1.11829.2.3.30 { 
    TYPE             = Host 
    VENDOR           = CorvilProbe 
    MODEL            = CNE-7750
    CERTIFICATION    = CERTIFIED 
    CONT             = Generic-MIB2 
    HOSTRESRCS       = MIB2
    
INSTRUMENTATION: 
    Disk-Fault              = HostResources:DeviceID 
    CPU/Memory              = HostResources:DeviceID 
    FileSystem-Performance  = HostResources:DeviceID
    Interface-Fault         = MIB2 
    Interface-Performance   = MIB2
}
# CISCO SYSTEM N9K-C93180YC-FX-24
.1.3.6.1.4.1.9.12.3.1.3.2353 {
    TYPE             = Switch
    VENDOR           = Cisco
    MODEL            = N9K-C93180YC-FX-24
    CERTIFICATION    = CERTIFIED 
    CONT             = Cisco-Nexus-NON-CLI
    HEALTH           = Nexus-Entity-EntSensor
    VLAN             = Cisco-Membership
    NEIGHBOR         = LLDP-CDP

INSTRUMENTATION:
    Environment                  = CiscoEntityFRU:DeviceID
    Card-Fault                   = CiscoEntityRF:DeviceID
    CPU/Memory                   = CiscoNexus:DeviceID
    Interface-Fault              = MIB2
    Interface-Performance        = MIB2
    Port-Fault                   = MIB2
    Port-Performance             = MIB2
    Port-Ethernet-Performance    = dot3_Ethernet
}
# Cisco Catalyst 8200-1N-4T
.1.3.6.1.4.1.9.1.2961 {
    TYPE            = Switch
    VENDOR          = Cisco
    MODEL           = Catalyst 8200-1N-4T
    CERTIFICATION   = CERTIFIED
    CONT            = Cisco-L3Switch
    HEALTH          = Cisco-ASR9k-EntSensor
    VLAN            = Cisco-Membership
    NEIGHBOR        = LLDP-CDP

INSTRUMENTATION:
    Environment                     = CiscoEntityFRU:DeviceID
    CPU/Memory                      = CiscoRouter:DeviceID
    Card-Fault                      = CiscoEntityFRU
    Interface-Fault                 = MIB2
    Interface-Performance           = CiscoRouter
    Interface-Ethernet-Performance  = CiscoRouter_Ethernet
    Port-Fault                      = MIB2   
    Port-Performance                = MIB2   
    Port-Ethernet-Performance       = dot3_Ethernet
}
#HP J9627A 2620-48-PoE+ Switch
.1.3.6.1.4.1.11.2.3.7.11.133 {
    TYPE            = Switch
    VENDOR          = HP
    MODEL           = hpSwitchJ9627A
    CERTIFICATION   = CERTIFIED
    CONT            = HP-Aruba-Switch
    HEALTH          = HP-Aruba-Switch
    VLAN            = Dot1q
    NEIGHBOR        = LLDP-CDP
                
INSTRUMENTATION:
    Environment                  = HPProCurveJ4SeriesEnvMon:DeviceID
    CPU/Memory                   = HPProCurveJ4SeriesEnvMon:DeviceID
    Interface-Fault              = MIB2
    Interface-Performance        = MIB2
    Port-Fault                   = MIB2
    Port-Performance             = MIB2
    Port-Ethernet-Performance    = dot3_Ethernet
}
# Cisco Catalyst 8500L-8S4X
.1.3.6.1.4.1.9.1.3069 {
    TYPE            = Switch
    VENDOR          = Cisco
    MODEL           = Catalyst 8500L-8S4X
    CERTIFICATION   = CERTIFIED
    CONT            = Cisco-L3Switch
    HEALTH          = Cisco-ASR9k-EntSensor
    VLAN            = Cisco-Membership
    NEIGHBOR        = LLDP-CDP

INSTRUMENTATION:
    Environment                     = CiscoEntityFRU:DeviceID
    CPU/Memory                      = CiscoRouter:DeviceID
    Card-Fault                      = CiscoEntityFRU
    Interface-Fault                 = MIB2
    Interface-Performance           = CiscoRouter
    Interface-Ethernet-Performance  = CiscoRouter_Ethernet
    Port-Fault                      = MIB2   
    Port-Performance                = MIB2   
    Port-Ethernet-Performance       = dot3_Ethernet
}
# Alcatel-Lucent Advanced Communications Server
.1.3.6.1.4.1.19631.1.2.1 { 
    TYPE             = Host 
    VENDOR           = Alcatel 
    MODEL            = Alcatel-Lucent Advanced Communications Server
    CERTIFICATION    = CERTIFIED 
    CONT             = Generic-MIB2
    HOSTRESRCS       = MIB2
    
INSTRUMENTATION: 
    Disk-Fault              = HostResources:DeviceID 
    CPU/Memory              = HostResources:DeviceID 
    FileSystem-Performance  = HostResources:DeviceID
    Interface-Fault         = MIB2 
    Interface-Performance   = MIB2
}
#Arista Networks CCS-720XP-48ZC2 Switch
.1.3.6.1.4.1.30065.1.2546.720.858.48.207.2 {
    TYPE                     = Switch
    VENDOR                   = Arista
    MODEL                    = aristaCCS720XP48ZC2
    CERTIFICATION            = CERTIFIED
    CONT                     = Arista-Switch
    HOSTRESRCS               = Arista-MIB2
    VLAN                     = AristaDot1q
    NEIGHBOR                 = LLDP
   
INSTRUMENTATION:
    Environment                  = EntityState:DeviceID
    Card-Fault                   = EntityState:DeviceID
    CPU/Memory                   = HostResources:DeviceID
    FileSystem-Performance       = HostResources:DeviceID
    Disk-Fault                   = HostResources:DeviceID
    Interface-Fault              = MIB2
    Interface-Performance        = MIB2
    Port-Fault                   = MIB2
    Port-Performance             = MIB2
    Port-Ethernet-Performance    = dot3_Ethernet
}
#Cisco Catalyst IE-3200-8T2S Rugged Switch
.1.3.6.1.4.1.9.1.2683 {  
    TYPE             = Switch 
    VENDOR           = Cisco 
    MODEL            = ciscoIE32008T2S  
    CERTIFICATION    = CERTIFIED
    CONT             = Cisco-L3Switch 
    HEALTH           = Cisco-Catalyst6832
    VLAN             = Cisco-Membership 
    NEIGHBOR         = LLDP-CDP
    
INSTRUMENTATION:  
    Card-Fault                      = CiscoEntityFRU:DeviceID   
    Environment                     = CiscoStack  
    CPU/Memory                      = CiscoSwitch:DeviceID  
    Interface-Fault                 = MIB2
    Interface-Performance           = CiscoRouter
    Interface-Ethernet-Performance  = CiscoRouter_Ethernet
    Port-Fault                      = MIB2   
    Port-Performance                = MIB2   
    Port-Ethernet-Performance       = dot3_Ethernet
}

 

check-circle-line exclamation-circle-line close-line
Scroll to top icon