![]() ![]() | Administrator Handbook | TOC |
LoriotPro Report Script, Generated File : from MIB file : Rfc1213.mib | |
Host Name : MEDUSE | |
Host : 12.1.1.254 | |
Generated at : Fri Dec 16 11:07:12 2005 |
Name | sysDescr |
Value | Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-I-M), Version 12.2(8)T5, RELEASE SOFTWARE (fc1) TAC Support: http://www.cisco.com/tac Copyright (c) 1986-2002 by cisco Systems, Inc. Compiled Fri 21-Jun-02 08:50 by ccai |
Description | A textual description of the entity.
This value should include the full name and version identification of the system's hardware type, software operating-system, and networking software. It is mandatory that this only contain printable ASCII characters. |
Name | sysObjectID |
Value | cisco2610xm |
Description | test |
Name | sysUpTime |
Value | 792957 |
Description | The time (in hundredths of a second) since
the network management portion of the system was last re-initialized. |
Name | sysContact |
Value | -- |
Description | The textual identification of the contact
person for this managed node, together with information on how to contact this person. |
Name | sysName |
Value | MEDUSE |
Description | An administratively-assigned name for
this managed node. By convention, this is the node's fully-qualified domain name. |
Name | sysLocation |
Value | -- |
Description | The physical location of this node
(e.g., `telephone closet, 3rd floor'). |
Name | sysServices |
Value | 78 |
Description | A value which indicates the set of services
that this entity primarily offers. The value is a sum. This sum initially takes the value zero, Then, for each layer, L, in the range 1 through 7, that this node performs transactions for, 2 raised to (L - 1) is added to the sum. For example, a node which performs primarily routing functions would have a value of 4 (2^(3-1)). In contrast, a node which is a host offering application services would have a value of 72 (2^(4-1) + 2^(7-1)). Note that in the context of the Internet suite of protocols, values should be calculated accordingly: layer functionality 1 physical (e.g., repeaters) 2 datalink/subnetwork (e.g., bridges) 3 internet (e.g., IP gateways) 4 end-to-end (e.g., IP hosts) 7 applications (e.g., mail relays) For systems including OSI protocols, layers 5 and 6 may also be counted. |
Generated by LoriotPro, (C) Luteus SARL |
mailto:support@loriotpro.com http://www.loriotpro.com/ |
This software is provided as is without any guarantees or warranty. Although the authors have attempted to find and correct any bugs in the package, they are not responsible for any damage or losses of any kind caused by the use or misuse of the package. The authors are under no obligation to provide service, corrections, or upgrades to this package. |
*** Generated: Fri Dec 16 11:07:12 2005 *** |