Dell-SSH-MIB: View SNMP OID List / Download MIB

VENDOR: RND


 Home MIB: Dell-SSH-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 rlSsh 1.3.6.1.4.1.89.78
The MIB module describes the private MIB for SSH supported by Dell's software and products.
       rlSshMibVersion 1.3.6.1.4.1.89.78.1 integer read-only
The MIB version. The current version is 2
       rlSshServer 1.3.6.1.4.1.89.78.2
           rlSshServerHostPublicKeyTable 1.3.6.1.4.1.89.78.2.1 no-access
This table contains the router's public key. Each row in this table contains a fragment of the key, in printable binhex format. There may be up to 160 characters in every fragment, and they are all combined to form one key. The key is generated by writing to rlSshServerRegenerateHostKey. To cause clients to connect to this router without printing warning messages (and also prevent active man-in-the-middle), the router's public key must printed out and inserted into the client's authorized_keys file
               rlSshServerHostPublicKeyTableEntry 1.3.6.1.4.1.89.78.2.1.1 no-access
The row definition for this table.
                   rlSshServerHostPublicKeyAlgorithm 1.3.6.1.4.1.89.78.2.1.1.1 rlsshpublickeyalgorithm read-only
Identifies the type of public key to be displayed.
                   rlSshServerHostPublicKeyFragmentId 1.3.6.1.4.1.89.78.2.1.1.2 unsigned32 read-only
Identifies the index of this fragment in the final key. All segments must be combined to form one big key.
                   rlSshServerHostPublicKeyFragmentText 1.3.6.1.4.1.89.78.2.1.1.3 displaystring read-only
A part of the readable text entry for the server's public authorzation key.
           rlSshServerHostPublicKeyFingerprintTable 1.3.6.1.4.1.89.78.2.2 no-access
This table contains the fingerprint for the router's public key.
               rlSshServerHostPublicKeyFingerprintTableEntry 1.3.6.1.4.1.89.78.2.2.1 no-access
The row definition for this table.
                   rlSshServerHostPublicKeyFingerprintAlgorithm 1.3.6.1.4.1.89.78.2.2.1.1 rlsshpublickeyalgorithm read-only
Identifies the type of public key to be displayed.
                   rlSshServerHostPublicKeyFingerprintDigestFormat 1.3.6.1.4.1.89.78.2.2.1.2 rlsshpublickeydigestformat read-only
Format of the digest to be displayed (OpenSSH or SSH.com).
                   rlSshServerHostPublicKeyFingerprint 1.3.6.1.4.1.89.78.2.2.1.3 displaystring read-only
SECSH format fingerprint of the server's public key. To prevent man in the middle attacks, users should make sure the ssh Server's fingerprint, as printed in the connection process, is similar to the one printed here.
           rlSshServerAuthorizedUsersPublicKeyTable 1.3.6.1.4.1.89.78.2.3 no-access
This table contains public keys for all users who are authorized to access the router. For a user to be able to log in using SSH, the user name must appear in this table, and the user's public key must match the one found here.
               rlSshServerAuthorizedUsersPublicKeyTableEntry 1.3.6.1.4.1.89.78.2.3.1 no-access
The row definition for this table.
                   rlSshServerAuthorizedUserName 1.3.6.1.4.1.89.78.2.3.1.1 displaystring read-write
Name of the user who owns this public key. Both the user name and the key bytes must match before a user is authenticated using this key.
                   rlSshServerAuthorizedUserPublicKeyFragmentId 1.3.6.1.4.1.89.78.2.3.1.2 unsigned32 read-write
Identifies the index of this fragment in the final key. All segments must be combined to form one big key.
                   rlSshServerAuthorizedUserPublicKeyFragmentText 1.3.6.1.4.1.89.78.2.3.1.3 displaystring read-write
A part of the readable text entry for the user's public authorzation key.
                   rlSshServerAuthorizedUserPublicKeyFragmentStatus 1.3.6.1.4.1.89.78.2.3.1.4 rowstatus read-write
Create or delete a fragment of the user's public key. A user is deleted if it has no remaining fragments.
           rlSshServerAuthorizedUsersPublicKeyFingerprintTable 1.3.6.1.4.1.89.78.2.5 no-access
This table contains the fingerprints of the public keys for all users who are authorized to access the router. To prevent man in the middle attacks, users should make sure the user's fingerprint, as printed in the connection process, is similar to the one printed here.
               rlSshServerAuthorizedUsersPublicKeyFingerprintTableEntry 1.3.6.1.4.1.89.78.2.5.1 no-access
The row definition for this table.
                   rlSshServerAuthorizedUserFingerprintName 1.3.6.1.4.1.89.78.2.5.1.1 displaystring read-write
Name of the user who owns this public key. Both the user name and the key bytes must match before a user is authenticated using this key.
                   rlSshServerAuthorizedUserPublicKeyFingerprintAlgorithm 1.3.6.1.4.1.89.78.2.5.1.2 rlsshpublickeyalgorithm read-only
Identifies the type of public key to be displayed.
                   rlSshServerAuthorizedUserPublicKeyFingerprintDigestFormat 1.3.6.1.4.1.89.78.2.5.1.3 rlsshpublickeydigestformat read-only
Format of the digest to be displayed (OpenSSH or SSH.com).
                   rlSshServerAuthorizedUserPublicKeyFingerprint 1.3.6.1.4.1.89.78.2.5.1.4 displaystring read-only
SECSH format fingerprint of the user's public key. To prevent man in the middle attacks, users should make sure their ssh fingerprint, as printed in the connection process, is similar to the one printed here.
           rlSshServerSessionTable 1.3.6.1.4.1.89.78.2.6 no-access
Each row in this table corresponds to an active SSH session with the server
               rlSshServerSessionTableEntry 1.3.6.1.4.1.89.78.2.6.1 no-access
The row definition for this table.
                   rlSshServerSessionIdentifier 1.3.6.1.4.1.89.78.2.6.1.1 unsigned32 read-only
Identifies the connection to which this row corresponds.
                   rlSshServerSessionPeerAddress 1.3.6.1.4.1.89.78.2.6.1.2 ipaddress read-only
The network address of the remote host connected to the server.
                   rlSshServerSessionPeerPort 1.3.6.1.4.1.89.78.2.6.1.3 unsigned32 read-only
The source network port of the remote host connected to the server.
                   rlSshServerSessionPeerVersion 1.3.6.1.4.1.89.78.2.6.1.4 displaystring read-only
The client version of the remote host connected to the server.
                   rlSshServerSessionUsername 1.3.6.1.4.1.89.78.2.6.1.5 displaystring read-only
SSH authenticated name of user connected to the server.
                   rlSshServerSessionCipher 1.3.6.1.4.1.89.78.2.6.1.6 displaystring read-only
Data encryption cipher used in this connection.
                   rlSshServerSessionHMAC 1.3.6.1.4.1.89.78.2.6.1.7 displaystring read-only
Message authentication code used in this connection.
           rlSshServerSessionInetTable 1.3.6.1.4.1.89.78.2.7 no-access
Each row in this table corresponds to an active SSH session with the server
               rlSshServerSessionInetTableEntry 1.3.6.1.4.1.89.78.2.7.1 no-access
The row definition for this table.
                   rlSshServerSessionInetIdentifier 1.3.6.1.4.1.89.78.2.7.1.1 unsigned32 read-only
Identifies the connection to which this row corresponds.
                   rlSshServerSessionInetPeerAddressType 1.3.6.1.4.1.89.78.2.7.1.2 inetaddresstype read-only
The network address of the remote host connected to the server.
                   rlSshServerSessionInetPeerAddress 1.3.6.1.4.1.89.78.2.7.1.3 inetaddress read-only
The network address of the remote host connected to the server.
                   rlSshServerSessionInetPeerPort 1.3.6.1.4.1.89.78.2.7.1.4 unsigned32 read-only
The source network port of the remote host connected to the server.
                   rlSshServerSessionInetPeerVersion 1.3.6.1.4.1.89.78.2.7.1.5 displaystring read-only
The client version of the remote host connected to the server.
                   rlSshServerSessionInetUsername 1.3.6.1.4.1.89.78.2.7.1.6 displaystring read-only
SSH authenticated name of user connected to the server.
                   rlSshServerSessionInetCipher 1.3.6.1.4.1.89.78.2.7.1.7 displaystring read-only
Data encryption cipher used in this connection.
                   rlSshServerSessionInetHMAC 1.3.6.1.4.1.89.78.2.7.1.8 displaystring read-only
Message authentication code used in this connection.
           rlSshServerImportExportSelfKeyTable 1.3.6.1.4.1.89.78.2.8 no-access
This table can be used for 2 purposes: 1) Importing public/private key pair to serve as the device key when acting as SSH server. This is done by setting entries to this table, according to the specified format. When the last entry (footer) is set, the whole key pair is checked and if valid, stored in CDB. 2) Exporting the device SSH server public/private key. This can be done by performing GetNext operations on this table.
               rlSshServerImportExportSelfKeyEntry 1.3.6.1.4.1.89.78.2.8.1 no-access
The row definition for this table.
                   rlSshServerImportExportSelfKeyAlgorithm 1.3.6.1.4.1.89.78.2.8.1.1 rlsshpublickeyalgorithm no-access
Identifies the type of key pair.
                   rlSshServerImportExportSelfKeyFormat 1.3.6.1.4.1.89.78.2.8.1.2 integer no-access
Specifies the format of public/key pair. The following formats are supported for import/export: 1) uuencoded_format - in this format both private and public key are in uu-encoded format, and are seperated from one another by header and footer. An example of the concateneation of all fragments in this format is: -----BEGIN RSA PRIVATE KEY----- tDaNkZZoCxXfkLLsLDlZ6T9H8U4Gz637eRV7BYBpapkidAxY1UG0/qgfKLPkbId4wzht6ArV9bE4fMtX wSMOxL3q31pOmUdVhjbWYcgZQBDy1DjFSbuIEdP85c96B9bBE2nPv90mSvb/6j8R2NItT/KJeiYMtLtI N3m6/zESKJGIrX0jP1RFDjVZSS5chSAFgB0egsLZEyOQn7jAqpX/x/easD2J6F/OjPXlJ9Hff2tMb3NU QYyBoWH2J9IxhWB6Vo66R9Y04JGR18uL/rV2sMCtpg5ppkVTEpNTp9qE1yXocR2NmzUfNFap+GJ4IHj8 CzkVfmJM/kEWaJsYgHbAgLyRg4QVyelfobv1B71aQ+u1z9KGu/QajkWdR04OQfsGOL1CvU2LGYDcRjfH jv+jl/UkDRRjoD9kt2WvouT+OL6esvKl0OJBqWbGNXg9TWv/VLtJIwgUno+MLaJuOM4Fh44+wpnqUXwQ TFtBFc8pzt5BoOwbv9gXpicTkq4/+GhwXWXxSVFebKhnHAvKSLT+Ba7K7ZeR8EIIxbXdDNFOiS45R2KI jxxXLXK44u6KGl5MygCKXUOFlJ+Zhgrq6ZH17z/RVJQ2CWqb5Ekn9GY3kH9QZ3mb4MDPfriWi2lHGXHY JmJd4SLQhpBdnOS5tu84QmyU3dNbAdzghDsR+dEY/6g7Cn0kcVkeHNZ0H+mCZik5f6XBD8eplkk43bdR FrkwTeAjwurGcKwdiKkR4DlfSq3DKssVBucTqUpqsKqPXLwTIL44rWKhEPXgGPB2XDG0VLvIRKkAgEGI LNTwOm091Ro= -----END RSA PRIVATE KEY----- -----BEGIN RSA PUBLIC KEY----- MIGHAoGBAOeIC9gRg3YaEGGMp3C00qNwLINAEDZV/J4BWM5WnWwCWZyHXDs2XiEmFu0ZONAD4gcT2f2f NNfCBPye39VVuOkKQuSV0MLLX5800LZ4y1BNcPzPZHpnGaCzl7iAjhfj9MolzAh5VRjeiYt0t1um4dm+ q9A4BtfpJqDYxCW9uxd/AgEj -----END RSA PUBLIC KEY----- Enumeration: 'uuencoded-format': 1.
                   rlSshServerImportExportSelfKeyFragmentId 1.3.6.1.4.1.89.78.2.8.1.3 integer no-access
Identifies the index of this fragment in the key pair input/output.
                   rlSshServerImportExportSelfKeyFragmentText 1.3.6.1.4.1.89.78.2.8.1.4 octet string read-write
A part of the readable text entry for the key pair input/output.
           rlSshServerPort 1.3.6.1.4.1.89.78.2.101 unsigned32 read-write
Specifies the TCP port used by the SSH 2 Server to listen for incoming connections.
           rlSshServerEnable 1.3.6.1.4.1.89.78.2.102 integer read-write
Enables listening for incoming SSH2 connections on the port defined in rlSshServerPort. Enumeration: 'enable': 1, 'disable': 2.
           rlSshServerEnablePublicKeyAuthentication 1.3.6.1.4.1.89.78.2.103 integer read-write
If PK authentication is enabled, incoming SSH connections are authenticated using public key authentication (using rlSshServerAuthorizedUsersPublicKeyTable), before authenticating using the router's standard AAA. Enumeration: 'enable': 1, 'disable': 2.
           rlSshServerRegenerateHostKey 1.3.6.1.4.1.89.78.2.104 rlsshpublickeyalgorithm read-write
Setting to a value other than none results in the Server (Host) Key being regenerated. The key size is host-specific.
           rlSshServerDefaultKeyFlag 1.3.6.1.4.1.89.78.2.105 integer read-only
This scalar indicates which of the SSH server keys are default keys (automatically generated). Enumeration: 'all': 3, 'rsa': 1, 'none': 4, 'dsa': 2.
           rlSshServerDeleteSelfKey 1.3.6.1.4.1.89.78.2.106 rlsshpublickeyalgorithm read-write
Setting to a value other than 'none' results in deleting the server self key of the chosen type. As a result a default key may be created (according to the MTSC..)
           rlSshServerEnablePublicKeyAuthAutoLogin 1.3.6.1.4.1.89.78.2.107 integer read-write
If PK authentication is succesfull and AAA local DB method is enabled for SSH line, the username is checked with AAA local DB. If present, the user is authenticated automatically without prompting for username or password. Enumeration: 'enable': 1, 'disable': 2.
           rlSshServerEnablePasswordAuthentication 1.3.6.1.4.1.89.78.2.108 integer read-write
If password authentication is enabled, incoming SSH connections are authenticated with username/password authentication using the router's standard AAA. Enumeration: 'enable': 1, 'disable': 2.
       rlSshClient 1.3.6.1.4.1.89.78.3
           rlSshClientUserName 1.3.6.1.4.1.89.78.3.1 displaystring read-write
Specifies the default user name the ssh client will use when authenticating to a remote server. In SCP sessions this global user name will be used unless a specific user name has been specified for the operation. The value of this MIB must not contain charachters ':' or '@' (those are used to indicate parameters seperation in SCP copy).
           rlSshClientRegenerateSelfKey 1.3.6.1.4.1.89.78.3.2 rlsshpublickeyalgorithm read-write
Setting to a value other than none results in the client self key being regenerated. The key size is host-specific.
           rlSshClientSelfPublicKeyTable 1.3.6.1.4.1.89.78.3.3 no-access
This table contains the router's client self public key. Each row in this table contains a fragment of the key, in printable binhex format. There may be up to 160 characters in every fragment, and they are all combined to form one key. The key is generated by writing to rlSshClientRegenerateSelfKey. To cause clients to connect to this router without printing warning messages (and also prevent active man-in-the-middle), the router's public key must printed out and inserted into the client's authorized_keys file
               rlSshClientSelfPublicKeyTableEntry 1.3.6.1.4.1.89.78.3.3.1 no-access
The row definition for this table.
                   rlSshClientSelfPublicKeyFragmentId 1.3.6.1.4.1.89.78.3.3.1.1 unsigned32 read-only
Identifies the index of this fragment in the final key. All segments must be combined to form one big key.
                   rlSshClientSelfPublicKeyAlgorithm 1.3.6.1.4.1.89.78.3.3.1.2 rlsshpublickeyalgorithm read-only
Identifies the type of public key to be displayed.
                   rlSshClientSelfPublicKeyFragmentText 1.3.6.1.4.1.89.78.3.3.1.3 displaystring read-write
A part of the readable text entry for the router's client public authorization key.
           rlSshClientSelfPublicKeyFingerprintTable 1.3.6.1.4.1.89.78.3.4 no-access
This table contains the fingerprint for the client's self key.
               rlSshClientSelfPublicKeyFingerprintTableEntry 1.3.6.1.4.1.89.78.3.4.1 no-access
The row definition for this table.
                   rlSshClientSelfPublicKeyFingerprintAlgorithm 1.3.6.1.4.1.89.78.3.4.1.1 rlsshpublickeyalgorithm read-only
Identifies the type of public key to be displayed.
                   rlSshClientSelfPublicKeyFingerprintDigestFormat 1.3.6.1.4.1.89.78.3.4.1.2 rlsshpublickeydigestformat read-only
Format of the digest to be displayed (OpenSSH or SSH.com).
                   rlSshClientSelfPublicKeyFingerprint 1.3.6.1.4.1.89.78.3.4.1.3 displaystring read-only
SECSH format fingerprint of the client's self key. To prevent man in the middle attacks, users should make sure the ssh Server's fingerprint, as printed in the connection process, is similar to the one printed here.
           rlSshClientAuthenticationMethod 1.3.6.1.4.1.89.78.3.5 integer read-write
Specifies the global authentication method for SSH client. SSH client will apply this authentication method upon connecting to a remote server, if no specific authentication method has been defined for this operation. Enumeration: 'password': 3, 'public-key-dsa': 2, 'public-key-rsa': 1.
           rlSshClientPassword 1.3.6.1.4.1.89.78.3.6 displaystring read-write
Specifies the global password for SSH client, to be used for 'password' authentication. SSH client will use this password during authentication phase (when connecting remote server), in case no specific password has been specified for this operation. The value of this MIB must not contain charachters ':' or '@' (those are used to indicate parameters seperation in SCP copy). Upon setting the password, its length must be in range 1-70.
           rlSshClientPasswordChangeTable 1.3.6.1.4.1.89.78.3.7 no-access
This table allows the user to change the password in a remote SSH server. It should be used when working with 'password' authentication with remote server in SCP sessions. Set operation on this table will initiate SCP session with the SSH server whose inet address is specified in the key rlSshClientPasswordChangeInetAddress. During this session the password for username rlSshClientPasswordChangeUsername will be changed in the server from rlSshClientPasswordChangeOldPassword to rlSshClientPasswordChangeNewPassword. The Set operation might fail, in case an SCP session is already being held. In case 'noError' is returned, the user can poll the fields rlSshClientPasswordChangeStatus and rlSshClientPasswordChangeFailureReason in order to get information on operation status and possible failure reason. Note: up to 3 status records can be saved.
               rlSshClientPasswordChangeEntry 1.3.6.1.4.1.89.78.3.7.1 no-access
The row definition for this table.
                   rlSshClientPasswordChangeInetAddrType 1.3.6.1.4.1.89.78.3.7.1.1 inetaddresstype no-access
Specifies the inet address type of remote SCP server
                   rlSshClientPasswordChangeInetAddr 1.3.6.1.4.1.89.78.3.7.1.2 inetaddress no-access
Specifies the inet address of remote SCP server
                   rlSshClientPasswordChangeUsername 1.3.6.1.4.1.89.78.3.7.1.3 displaystring read-write
Specifies the username for which the password change is required.
                   rlSshClientPasswordChangeOldPassword 1.3.6.1.4.1.89.78.3.7.1.4 displaystring read-write
Specifies the old password that was in use for rlSshClientPasswordChangeUsername until now. Upon setting a value in this entry, length of this field value must be 6-70. Password of length 0 will always be returned on GET operations.
                   rlSshClientPasswordChangeNewPassword 1.3.6.1.4.1.89.78.3.7.1.5 displaystring read-write
Specifies the new password that should be in use for rlSshClientPasswordChangeUsername from now on. Upon setting a value in this entry, length of this field value must be 6-70. Password of length 0 will always be returned on GET operations.
                   rlSshClientPasswordChangeStatus 1.3.6.1.4.1.89.78.3.7.1.6 integer read-only
Specifies the status of last password change operation on remote server identified by rlSshClientPasswordChangeInetAddress. In case this data was erased (3 or more password change operations have been performed since the operation on this server), the status will be 'noData'. Enumeration: 'failed': 3, 'inProgress': 1, 'noData': 4, 'succeeded': 2.
                   rlSshClientPasswordChangeFailureReason 1.3.6.1.4.1.89.78.3.7.1.7 displaystring read-only
In case the value of rlSshClientPasswordChangeStatus is 'failed', this field will contain the failure reason.
           rlSshClientDeleteSelfKey 1.3.6.1.4.1.89.78.3.8 rlsshpublickeyalgorithm read-write
Setting to a value other than 'none' results in deleting the client self key of the chosen type.
           rlSshClientImportExportSelfKeyTable 1.3.6.1.4.1.89.78.3.9 no-access
This table can be used for 2 purposes: 1) Importing public/private key pair to serve as the device key when acting as SSH client. This is done by setting entries to this table, according to the specified format. When the last entry (footer) is set, the whole key pair is checked and if valid, stored in CDB. 2) Exporting the device SSH client public/private key. This can be done by performing GetNext operations on this table.
               rlSshClientImportExportSelfKeyEntry 1.3.6.1.4.1.89.78.3.9.1 no-access
The row definition for this table.
                   rlSshClientImportExportSelfKeyAlgorithm 1.3.6.1.4.1.89.78.3.9.1.1 rlsshpublickeyalgorithm no-access
Identifies the type of key pair.
                   rlSshClientImportExportSelfKeyFormat 1.3.6.1.4.1.89.78.3.9.1.2 integer no-access
Specifies the format of public/key pair. The following formats are supported for import/export: 1) uuencoded_format - in this format both private and public key are in uu-encoded format, and are seperated from one another by header and footer. An example of the concateneation of all fragments in this format is: -----BEGIN ENCRYPTED RSA PRIVATE KEY----- tDaNkZZoCxXfkLLsLDlZ6T9H8U4Gz637eRV7BYBpapkidAxY1UG0/qgfKLPkbId4wzht6ArV9bE4fMtX wSMOxL3q31pOmUdVhjbWYcgZQBDy1DjFSbuIEdP85c96B9bBE2nPv90mSvb/6j8R2NItT/KJeiYMtLtI N3m6/zESKJGIrX0jP1RFDjVZSS5chSAFgB0egsLZEyOQn7jAqpX/x/easD2J6F/OjPXlJ9Hff2tMb3NU QYyBoWH2J9IxhWB6Vo66R9Y04JGR18uL/rV2sMCtpg5ppkVTEpNTp9qE1yXocR2NmzUfNFap+GJ4IHj8 CzkVfmJM/kEWaJsYgHbAgLyRg4QVyelfobv1B71aQ+u1z9KGu/QajkWdR04OQfsGOL1CvU2LGYDcRjfH jv+jl/UkDRRjoD9kt2WvouT+OL6esvKl0OJBqWbGNXg9TWv/VLtJIwgUno+MLaJuOM4Fh44+wpnqUXwQ TFtBFc8pzt5BoOwbv9gXpicTkq4/+GhwXWXxSVFebKhnHAvKSLT+Ba7K7ZeR8EIIxbXdDNFOiS45R2KI jxxXLXK44u6KGl5MygCKXUOFlJ+Zhgrq6ZH17z/RVJQ2CWqb5Ekn9GY3kH9QZ3mb4MDPfriWi2lHGXHY JmJd4SLQhpBdnOS5tu84QmyU3dNbAdzghDsR+dEY/6g7Cn0kcVkeHNZ0H+mCZik5f6XBD8eplkk43bdR FrkwTeAjwurGcKwdiKkR4DlfSq3DKssVBucTqUpqsKqPXLwTIL44rWKhEPXgGPB2XDG0VLvIRKkAgEGI LNTwOm091Ro= -----END RSA PRIVATE KEY----- -----BEGIN RSA PUBLIC KEY----- MIGHAoGBAOeIC9gRg3YaEGGMp3C00qNwLINAEDZV/J4BWM5WnWwCWZyHXDs2XiEmFu0ZONAD4gcT2f2f NNfCBPye39VVuOkKQuSV0MLLX5800LZ4y1BNcPzPZHpnGaCzl7iAjhfj9MolzAh5VRjeiYt0t1um4dm+ q9A4BtfpJqDYxCW9uxd/AgEj -----END RSA PUBLIC KEY----- Enumeration: 'uuencoded-format': 1.
                   rlSshClientImportExportSelfKeyFragmentId 1.3.6.1.4.1.89.78.3.9.1.3 integer no-access
Identifies the index of this fragment in the key pair input/output.
                   rlSshClientImportExportSelfKeyFragmentText 1.3.6.1.4.1.89.78.3.9.1.4 octet string read-write
A part of the readable text entry for the key pair input/output.
           rlSshClientRemoteServerPublicKeyFingerprintTable 1.3.6.1.4.1.89.78.3.10 no-access
Table for storing fingerprints of remote servers public keys. It is used for the purpose of server authentication. An entry can be inserted to this table either explicitly by user configuration, or during copy operation, after user's approval.
                 rlSshClientRemoteServerPublicKeyFingerprintEntry 1.3.6.1.4.1.89.78.3.10.1 no-access
The row definition for this table.
                     rlSshClientRemoteServerFingerprintInetAddrType 1.3.6.1.4.1.89.78.3.10.1.1 inetaddresstype no-access
Remote server inet address type.
                     rlSshClientRemoteServerFingerprintInetAddr 1.3.6.1.4.1.89.78.3.10.1.2 inetaddress no-access
Remote server inet address.
                     rlSshClientRemoteServerFingerprint 1.3.6.1.4.1.89.78.3.10.1.3 octet string read-only
Remote server fingerprint.
                     rlSshClientRemoteServerFingerprintStatus 1.3.6.1.4.1.89.78.3.10.1.4 rowstatus read-only
Row status for this row.
           rlSshClientRemoteServersAuthenticationEnable 1.3.6.1.4.1.89.78.3.11 integer read-write
Setting this field to 'enable' enables remote servers authentication. As a result, while opening a session with a remote server, the fingerprint of the remote server will be computed and looked for in the table rlSshClientRemoteServerPublicKeyFingerprintTable. If an entry with the key (server-inet-address, server-fingerprint) is found, the server is considered authenticated. Otherwise, the server is not authenticated (unless the user specifically approved this server can be trusted). Enumeration: 'enable': 1, 'disable': 2.
           rlSshClientDefaultKeyFlag 1.3.6.1.4.1.89.78.3.12 integer read-only
This scalar indicates which of the SSH client keys are default keys (automatically generated). Enumeration: 'all': 3, 'rsa': 1, 'none': 4, 'dsa': 2.