VitalQIP DNS/DHCP & IP Management Software SNMP MODULE VERSION 2.3 USER S GUIDE
|
|
|
- Gerard Pope
- 10 years ago
- Views:
Transcription
1 VitalQIP DNS/DHCP & IP Management Software SNMP MODULE VERSION 2.3 USER S GUIDE This document contains proprietary information of Alcatel- Lucent and is not to be disclosed or used except in accordance with applicable agreements. ISSUE 1 APRIL 2009
2 Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners.. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright 2009 Alcatel-Lucent. All Rights Reserved. Contains proprietary/trade secret information which is the property of Alcatel-Lucent and must not be made available to, or copied or used by anyone outside Alcatel-Lucent without its written authorization. Not to be used or disclosed except in accordance with applicable agreements. Licenses Refer to Appendix C, Third party software license statements in the VitalQIP Release 7.2 Installation Guide ( R7.2) for a complete description of all software licenses used to develop this product.
3 Contents About this document Purpose...v Reason for revision...v Intended audience... vi How to use this document... vi Conventions used... vii Related information... vii Technical support... viii How to order... ix How to comment... ix 1 SNMP Support for the Lucent DHCP and DNS Servers Introduction Lucent DHCP MIB variables Lucent DNS MIB variables Trap object IDs (OIDs) Install and configure the SNMP Module Installation and configuration order Install the SNMP Module on Windows Uninstall the SNMP Module from Windows Install SNMP Module on a UNIX platform Configure the SNMP Master Agent Configure additional user names Configure additional SNMPv1/v2c notification traps Configure additional SNMPv3 notification traps Start the SNMP Master Agent Start the SNMP Master Agent on UNIX Start the SNMP Master Agent on Windows Verification of DHCP/DNS server SNMP MIB access Additional information iii
4 Contents 4 Console and template installations Console installation Overview Install SNMP with console installation Template installation Overview Install SNMP using a template A IN Increase SNMP Module security Limit SNMPv1 and SNMPv2c access to MIB variables...a-2 SNMPv3 security...a-5 Set authentication and privacy protocols for SNMPv3...A-8 Index iv
5 About this document Purpose Welcome to the Simple Network Management Protocol (SNMP) Module a powerful network device and service management tool. The SNMP Module, a valuable enhancement to the base VitalQIP product, allows you to monitor the status and usage of your Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) servers. Refer to this section for the audience, organization, and typographical conventions used in this manual. This section also describes the package contents, how to order additional manuals, and how to obtain technical support. Reason for revision The following table shows the revision history of this document. Issue Feature Description Feature impact 1 New DNS MIB New DNS MIBs were added and older variables were removed. Table, Lucent DNS MIB variables (p. 17) 1 New SNMP Module installation 1 Console and template installation 1 Trap object Ids (OIDs) There is a new SNMP Module installation. This chapter provides information about installing SNMP from the console and the template The Trap object Ids section has been revamped. Newer examples have been added. Procedure, Install the SNMP Module on Windows (p. 2-3) Procedure, Install SNMP Module on a UNIX platform (p. 2-13) Chapter 4, Console and template installations Trap object IDs (OIDs) (p. 1-37) v
6 About this document Intended audience How to use this document This document is intended for SNMP Module users who plan to manage and administer an IP network address infrastructure. The reader is expected to understand basic networking concepts and have a working knowledge of the operating system on which the SNMP Module is running. Two types of groups interact with the SNMP Module: SNMP Module administrators - The Information Technology (IT) professionals who install, configure, and administer the SNMP Module product. SNMP Module users - The IT professionals who use the SNMP Module as a servicelevel monitoring and capacity tool. The manual is organized as follows: Chapter Chapter 1, SNMP Support for the Lucent DHCP and DNS Servers Chapter 2, Install and configure the SNMP Module Chapter 3, Start the SNMP Master Agent Chapter 4, Console and template installations Appendix A, Increase SNMP Module security Description Describes how SNMP support is provided to the Lucent DHCP and Lucent DNS servers. It also describes how these servers use SNMP MIB variables and it provides summary tables of the Lucent DHCP and Lucent DNS server SNMP MIB variables. Describes the tasks required to install and configure the Lucent SNMP DHCP and DNS Agents. Describes how to start the SNMP Agent and how to verify SNMP operations. Describes how to install SNMP from the console and the template. Describes how to increase security for the SNMP Module. vi
7 About this document Conventions used The following table lists the typographical conventions used throughout this manual. Convention Meaning Example boldface Helvetica bold Letter Gothic Letter Gothic bold <angle brackets> italics Names of items on screens. Names of commands and routines Names of buttons you should click. Uniform Resource Locators (URLs) Names of keys on the keyboard to be pressed. Output from commands, code listings, and log files Input that you should enter from your keyboard. Variables that you must substitute another value for. Manual and book titles. Directories, paths, file names, and addresses. Select the Client check box. The qip_getappllst routine returns the entire list of existing applications. Click OK. The VitalQIP product site can be found at Press Enter to continue. # Name: Share shared-network _200_200_200_0 Run the following command: c:\setup.exe <debugfile>.bak.log Refer to the VitalQIP User s Guide for more information. A symbolic link must be created from /etc/named.conf that points to named.conf. bold italic Emphasis Read-only. The name of the service element. click right-click double-click Click the left button on your mouse once. Click the right button on your mouse. Double-click the left button on your mouse. To delete the object, click Delete. Right-click on a service. Double-click the book icon. Related information Use the VitalQIP Administrator Reference Manual (part number: ) with this product. This guide describes planning and configuring your network, information about the VitalQIP interface, advanced DNS and DHCP configurations, and troubleshooting. vii
8 About this document Technical support If you need assistance with SNMP Module, you can contact Technical Support via phone or . Refer to the following table for a list of phone numbers, addresses, and addresses: Region Address Contact information North America Europe, Middle East, and Africa Central and South America Asia Pacific Alcatel-Lucent 400 Lapp Road Malvern, PA USA Alcatel-Lucent Voyager Place Shoppenhangers Road Maidenhead Berkshire SL6 2PJ UK Alcatel-Lucent Brasil S/A Avenida Marginal Direita Anchieta, Km 11,5 CEP: Jardim Santa Cruz - Sao Paulo - SP Brazil Alcatel-Lucent Australia 280 Botany Road Alexandria NSW 2015 Australia Phone: LUCENT8 ( ) Option 1, Option 2 Web: Phone: LUCENT or [email protected] Web: Phone: or For other local CALA numbers, consult the web site or contact your local sales representative. Phone: (toll free from within Australia) (IDD) (toll free from Asia Pacific - China, Hong Kong, Indonesia, South Korea, Malaysia, New Zealand, Philippines, Singapore, Taiwan, and Thailand) (613) (toll call from any country) [email protected] Training Support Alcatel-Lucent University offers cost-effective educational programs that support the VitalQIP product. Our offerings also include courses on the underlying technology for VitalQIP products (for example, DNS and DHCP). Our classes blend presentation, discussion, and hands-on exercises to reinforce learning. Students acquire in-depth knowledge and gain expertise by practicing with our products in a controlled, instructorfacilitated setting. If you have any questions, please contact us at LUCENT8, option 2, option 2. viii
9 About this document How to order How to comment Customers can access additional VitalQIP manuals online at Select Documentation from the Customer Support menu and click the Product index link. Click the V link to access VitalQIP and VitalQIP add-on products. To comment on this, go to the Online Comment Form ( or your comments to the Comments Hotline ([email protected]). ix
10 About this document x
11 1 SNMP Support for the Lucent DHCP and DNS Servers Overview Purpose This chapter describes how Simple Network Management Protocol (SNMP) support is provided to the Lucent DHCP and Lucent DNS servers. This information presents the following topics. Introduction 2 Lucent DHCP MIB variables 3 Lucent DNS MIB variables 17 Trap object IDs (OIDs)
12 SNMP Support for the Lucent DHCP and DNS Servers Introduction Introduction SNMP provides an industry-standard protocol used by a number of Network Management products, such as HP Openview, to manage devices and services on the network. SNMP provides a standard way for management products to monitor network devices and services. The Lucent Management Information Base (MIB) is SNMPV1, SNMPV2c, and SNMPV3 compliant. Alcatel-Lucent provides SNMP support to our Lucent DNS and Lucent DHCP servers, enabling the collection and monitoring of statistics and general operational information through the use of SNMP MIB variables. The Lucent DNS and DHCP servers can provide information through these MIB variables. The variables offered by Alcatel-Lucent have been designed to be used in conjunction with MIB-2, to allow monitoring of Lucent DHCP and DNS name services via SNMP. 1-2
13 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Lucent DHCP MIB variables Alcatel-Lucent has modified the Lucent DHCP server on all supported platforms to optionally support SNMP. The statistical information gathered by the DHCP server through normal operations can be accessed through the Lucent MIB variables. Alcatel-Lucent has implemented portions of the DHCP MIB objects defined by the DHCP Working Group of the Internet Engineering Task Force (IETF) in a proposed draft. In particular, there is support for Bootp and DHCP counter and statistics groups. The supported DHCP server MIB variables are grouped in categories listed in the following tables. Refer to Table 1-1 for a description of each variable. Table 1-1 Summary of SNMP MIB variables for the Lucent DHCP server Function MIB Variable(s) Description Operational information: Server Information dhcpservsystemdescr Provides a textual description of the server. This value includes the full name and version identification of the server. Server Status dhcpservsystemstatus Status of the DHCP server: 0 Starting server up 1 Server is running 2 Server is stopping 3 Server is halted 4 Server is reloading its configuration Number of seconds since service was started Number of seconds since service was last reset (config files were reread) Counter information by server: dhcpservsystemuptime dhcpservsystemresettime Note: Once the server has been completely stopped, no status can be returned from this variable. This value is the time elapsed (in seconds) since it started. This value is the time elapsed (in seconds) since the last time the name server was reset. Number of Used Subnets (in use) dhcpservcountusedsubnets The number of subnets managed by the server (for example, configured), from which the server has issued at least one lease. 1-3
14 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Number of Unused Subnets (not in use) Number of exhausted/full Subnets dhcpservcountunusedsubnets dhcpservcountfullsubnets The number of subnets managed by the server, from which the server has issued no leases. The number of subnets managed by the server, in which all defined addresses have been leased to clients. Subnets containing unavailable leases are not represented in this counter. Counter information for Bootp packets: Number of Bootp Request Packets received Number of Invalid Bootp Request Packets received Number of Bootp Packets sent Number of Bootp Packets dropped with unknown clients Number of Bootp packets dropped because this server cannot serve addresses to this subnet dhcpservbootpcountrequests dhcpservbootpcountinvalids dhcpservbootpcountreplies dhcpservbootpcountdropped UnknownClients dhcpservbootpcountdroppednot ServingSubnet The number of packets received that contain a Message Type of 1 (BOOTREQUEST) in the first octet and do not contain option number 53 (DHCP Message Type) in the options. The number of packets received that do not contain a Message Type of 1 (BOOTREQUEST) in the first octet or are not valid BOOTP packets (for example, too short, invalid field in packet header) The number of packets sent that contain a Message Type of 2 (BOOTREPLY) in the first octet and do not contain option number 53 (DHCP Message Type) in the options. The number of BOOTP packets dropped due to the server not recognizing or not providing service to the hardware address received in the incoming packet. The number of BOOTP packets dropped due to the server not being configured or not able to serve addresses on the subnet from which this message was received. Counter information for DHCP packets: Number of DHCP Discover Packets received dhcpservdhcpcountdiscovers The number of DHCPDISCOVER (option 53 with value 1) packets received. 1-4
15 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Number of DHCP Request Packets received Number of DHCP Release Packets received Number of DHCP Decline Packets received Number of DHCP Inform Packets received Number of Invalid DHCP packets received Number of DHCP Offers sent Number of DHCP Acks sent Number of DHCP Nacks sent Number of DHCP Packets dropped with unknown clients Number of DHCP Packets dropped because this server cannot serve addresses to this subnet dhcpservdhcpcountrequests dhcpservdhcpcountreleases dhcpservdhcpcountdeclines dhcpservdhcpcountinforms dhcpservdhcpcountinvalids The number of DHCPREQUEST (option 53 with value 3) packets received. The number of DHCPRELEASE (option 53 with value 7) packets received. The number of DHCPDECLINE (option 53 with value 4) packets received. The number of DHCPINFORM (option 53 with value 8) packets received. The number of DHCP packets received whose DHCP message type (option 53) is not understood or handled by the server. dhcpservdhcpcountoffers The number of DHCPOFFER (option 53 with value 2) packets sent. dhcpservdhcpcountacks The number of DHCPACK (option 53 with value 5) packets sent. dhcpservdhcpcountnacks The number of DHCPNACK (option 53 with value 6) packets sent. dhcpservdhcpcountdroppedunknown Client dhcpservdhcpcountdroppednot ServingSubnet The number of DHCP packets dropped due to the server not recognizing or not providing service to the client ID and/or hardware address received in the incoming packet. The number of DHCP packets dropped due to the server not being configured or not able to serve addresses on the subnet from which this message was received. Statistical/performance information for Bootp packets: Minimum Amount of Time between receiving two Bootp packets dhcpservbootpstatminarrivalinterval The minimum amount of time between receiving two BOOTP messages. A message is received at the server when the server is able to begin processing the message. This typically occurs immediately after the message is read into server memory. If no messages have been received, or the time interval is less than 1 ms, this object contains a zero value. The value is in milliseconds. 1-5
16 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Maximum Amount of Time between receiving two Bootp packets Number of Seconds since the last Bootp Packet was received Minimum Response Time to Bootp packets dhcpservbootpstatmaxarrivalinterval dhcpservbootpstatlastarrivaltime dhcpservbootpstatminresponsetime The maximum amount of time between receiving two BOOTP messages. A message is received at the server when the server is able to begin processing the message. This typically occurs immediately after the message is read into server memory. If no messages have been received, this object contains a zero value. The value is in milliseconds. The number of seconds since the last valid BOOTP message was received by the server. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. The smallest time interval measured as the difference between the arrival of a BOOTP message at the server and the successful transmission of the response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received, or the interval is less than 1 ms, this object contains a zero value. The value is in milliseconds. 1-6
17 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Maximum Response Time to Bootp packets Sum of the Response Times for Bootp packets dhcpservbootpstatmaxresponsetime dhcpservbootpstatsumresponsetime The largest time interval measured as the difference between the arrival of a BOOTP message at the server and the successful transmission of the response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. The value is in milliseconds. The sum of the response time intervals (in milliseconds), where a response time interval is measured as the difference between the arrival of a BOOTP message at the server and the successful transmission of the response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. The value is in milliseconds. Statistical/performance information for DHCP packets: 1-7
18 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Minimum Amount of Time between receiving two DHCP packets Maximum Amount of Time between receiving two DHCP packets Number of Seconds since the last DHCP Packet was received dhcpservdhcpstatminarrivalinterval dhcpservdhcpstatmaxarrivalinterval dhcpservdhcpstatlastarrivaltime The minimum amount of time between receiving two DHCP messages.a message is received at the server when the server is able to begin processing the message. This typically occurs immediately after the message is read into server memory. If no messages have been received, or the interval is less than 1 ms, this object contains a zero value. The value is in milliseconds. The maximum amount of time between receiving two DHCP messages. A message is received at the server when the server is able to begin processing the message. This typically occurs immediately after the message is read into server memory. If no messages have been received, this object contains a zero value. The value is in milliseconds. The number of seconds since the last valid DHCP message was received by the server. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. 1-8
19 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Minimum Response Time to DHCP packets Maximum Response Time to DHCP packets dhcpservdhcpstatminresponsetime dhcpservdhcpstatmaxresponsetime The smallest time interval measured as the difference between the arrival of a DHCP message at the server and the successful transmission of the response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received, or the interval is less than 1 ms, this object contains a zero value. The value is in milliseconds. The largest time interval measured as the difference between the arrival of a DHCP message at the server and the successful transmission of the response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. The value is in milliseconds. 1-9
20 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Sum of the Response Times for DHCP packets dhcpservdhcpstatsumresponsetime The sum of the response time intervals (in milliseconds), where a response time interval is measured as the difference between the arrival of a DHCP message at the server and the successful transmission of the response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. Value is in milliseconds. DHCP and Bootp statistics by subnet and/or address pool: Subnet Address of the Address Pool (scope) of the table entry that is being referenced dhcpservrangeentry ::= SEQUENCE { dhcpservrangesubnetaddr, dhcpservrangesubnetmask, dhcpservrangestart, dhcpservrangeend, dhcpservrangeinuse, dhcpservrangeoutstandingoffers, dhcpservrangeunavailable, dhcpservrangetype, dhcpservrangeunused } dhcpservrangesubnetaddr Note that a table is provided that will allow all of the following information to be accessed not only by subnet, but also by address pool (scope). The IP address defining this subnet. 1-10
21 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Subnet Mask of the Address Pool (scope) of the table entry that is being referenced Starting IP Address of the Address Pool of the table entry that is being referenced Ending IP Address of the Address Pool of the table entry that is being referenced Number of Addresses in this range (of the table entry) that are Used (in use) Number of Addresses in this range (of the table entry) that have outstanding Offers pending Number of Addresses in this range (of the table entry) that are unavailable dhcpservrangesubnetmask dhcpservrangestart dhcpservrangeend dhcpservrangeinuse dhcpservrangeoutstandingoffers dhcpservrangeunavailable The subnet mask associated with this subnet. The starting IP Address of the Address pool range for this entry within the table. The ending IP Address of the Address pool range for this entry within the table. The number of addresses in this range that are currently in use. This number includes address leases that have not expired, and addresses that have been reserved (by the server through configuration). The number of outstanding DHCPOFFER messages for this range is reported with this value. An offer is outstanding if the server has sent a DHCPOFFER message to a client, but has not yet received a DHCPREQUEST message from the client, nor h as the server-specific time-out (limiting the time in which a client can respond to the offer message) for the offer message expired. The number of IP Addresses within this range that are marked by the DHCP server as unavailable. An address is marked as unavailable by the DHCP server when an acknowledgement of the address conflict detection (PING) is received. In addition, the DHCP server will mark leases as unavailable if a DHCPDECLINE is received from the DHCP client. 1-11
22 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description The Type of ( IP) Address range of the table entry Number of Addresses in this range (of the table entry) that are unused or available for assignment dhcpservrangetype dhcpservrangeunused DHCP Server Client Lease Type: 1 Manual Bootp 2 Automatic Bootp 3 Manual DHCP 4 Automatic DHCP 5 Dynamic DHCP The number of addresses in this range that are currently unused. This number excludes address leases that have not expired, and addresses that have been reserved (by the server through configuration). DHCP Server Failover Configuration: Note: These MIB variables are only available when you have a DHCP Failover server configuration. Indicates the IP address of the partner server. Indicates the function of the partner server dhcpservfailoverpartneraddr dhcpservfailoverpartnertype Shows the failover server IP address for a queried primary server, or the primary server IP address for a queried failover server. If no failover server is defined, this has a null value. The type of partner server. The following values indicate the type of partner server: primary (1) - The partner server is a primary server. secondary (2) - The partner server is a secondary server. 1-12
23 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Indicates the status of the partner server dhcpservfailoverpartnerstatus This variable indicates the last known state of the queried server s partner. The following values indicate the status of the partner server: unknown (0) - The status of the partner server identified in the dhcpservfailoverpartneraddr variable, as defined in this server's dhcpd.pcy file, is unknown. This value is valid for primary and secondary partner servers. syncing (1) - The partner server identified in the dhcpfailoverpartneraddr variable is exchanging lease data with the server maintaining the partner MIB variables. This value is valid for primary and secondary partner servers. active (2) - The partner server identified in the dhcpfailoverpartneraddr variable is running and is giving out leases on its configured subnets. This value is only valid when querying a secondary server for the status of its primary partner. 1-13
24 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Indicates the time of the last poll or response DHCP server SNMP traps: The DHCP server has started The DHCP server has stopped The DHCP server has reloaded its configuration dhcpservfailoverpartnerstatus (continued) dhcpservfailoverpartnerpolltime dhcpserverstarted dhcpserverstopped dhcpserverreload inactive (3) - The partner server identified in the dhcpfailoverpartneraddr variable is not responding to poll messages and not giving out leases on its configured subnets. This value is only valid when querying a secondary server for the status of its primary partner. When querying a primary server for the status of its secondary partner, only the 0 and 1 values are used. The primary server does not poll the secondary server. As a result, the primary server does not know if the secondary server is running after the primary server has synchronized with the secondary server. After the primary server has synchronized with the secondary server, the partner status value for the secondary server is set to the unknown (0) status. A timestamp documenting the time of receipt for the last poll message from a secondary partner server or last poll response from each primary server. The DHCP server has been started. The DHCP server has been stopped. The DHCP server has been told to reload its configuration. 1-14
25 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description The DHCP server has determined that a subnet has been depleted of addresses that satisfy the configured ForceClass server policy value. The DHCP server receives a bad packet. The DHCP Failover server has taken control of some address space The DHCP Failover server has returned control to the primary server for some address space Indicates the number of leases issued by the server has exceeded the specified threshold value set for the subnet. Indicates the number of leases issued by the server fallen below the threshold value set for the subnet. Indicates the lease request is from an unknown client. dhcpserversubnetdepleted dhcpserverbadpacket dhcpserverfailoveractive dhcpserverfailoverreturnedcontrol dhcpserversubnetthresholdexceeded dhcpserversubnetthresholddescent dhcpserverdropunknownclient The DHCP server has used all the addresses within a subnet that satisfy the configured ForceClass server policy value, and has received a discover request for which it cannot offer a lease. This trap will be generated for each such discover request that cannot be offered a lease. The address of the depleted subnet is included in the trap text. The DHCP server has received a malformed packet. This trap is issued by the secondary server. A primary server is down and its scopes will be serviced by this failover server. This trap is issued by the secondary server. The failover server has returned control to its primary partner. The trap is issued by the LucentDHCP server when the percentage of used addresses in a subnet has exceeded the value of the threshold defined for the subnet or global server threshold, assuming that a subnet-specific value is not specified with a subnet in the server configuration file. The trap is issued by the LucentDHCP server when the percentage of used addresses in a subnet has fallen below the value of the threshold defined for the subnet or global server threshold, assuming that a subnet-specific value is not specified with a subnet in the server configuration file. The trap is issued when an unregistered client attempts to obtain a DHCP lease. 1-15
26 SNMP Support for the Lucent DHCP and DNS Servers Lucent DHCP MIB variables Function MIB Variable(s) Description Indicates the address for which the server wants to provide a lease is unavailable. dhcpserverpingresponsereceived The address that the server wanted to provide is not available as indicated by a ping response. This can indicate unauthorized use of the address or the network. 1-16
27 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Lucent DNS MIB variables The following MIB variable definitions are Alcatel-Lucent extensions to the standard DNS MIB. They are used to count statistics that are not covered in the DNS MIB defined by RFC1611. Refer to Table 1-2 for a description of each MIB variable. Table 1-2 Summary of SNMP MIB variables for the Lucent DNS server Function MIB Variable(s) Description Operational information: Server information dnsservsystemdescr Provides a textual description of the server. This value includes the full name and version identification of the server. Server Status dnsservsystemstatus The current status of the server: 1 Some other state that is not listed in The service is being reset 3 The service is initializing 4 The service is running Number of seconds since service was started Number of seconds since service was last reset (config files were re-read) dnsservconfiguptime dnsservconfigresettime Counter information by OP Code/class/resource record type: Note: Once the server has been completely stopped, no status can be returned from this variable. If the server has a persistent state (for example, a process), this value will be the time elapsed (in seconds) since it started. For software without a persistent state, this value will be zero. This value is the time elapsed (in seconds) since the last time the name server was reset. 1-17
28 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description The DNS OP Code of this table entry The DNS Class of this table entry dnsservcounterentry ::= SEQUENCE { dnsservcounteropcode, dnsservcounterqclass, dnsservcounterqtype, dnsservcountertransport, dnsservcounterrequests, dnsservcounterresponses } dnsservcounteropcode dnsservcounterqclass Note that a table is provided that will allow request and response information counters to be accessed by OpCode, Class, Type, and Transport. The DNS OP Code being counted in this row of the table: 0 A standard query (QUERY) 1 (obsolete) An inverse query (IQUERY) 2 A server status request (STATUS) 4 - A notify (NOTIFY) 5 - A dynamic update (UPDATE) The class of record being counted in this row of the table. 1 'IN' the Internet 2 'CS' the CSNET class (Obsolete) 3 'CH' the CHAOS class 4 'HS' Hesiod 1-18
29 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description The DNS Record Type of this table entry dnsservcounterqtype 1-19
30 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description 1 Host address (A) 2 Authoritative server (NS) 3 Mail destination (MD) 4 Mail forwarder (MF) 5 Canonical name (CNAME) 6 Start of authority zone (SOA) 7 Mailbox domain name (MB) 8 Mail group member (MG) 9 Mail rename name (MR) 10 Null resource record (NULL) 11 Well known service (WKS) 12 Domain name pointer (PTR) 13 Host information (HINFO) 14 Mailbox information (MWFO) 15 Mail routing information (MX) 16 Text strings (TXT) 17 Responsible person (RP) 18 AFS cell database (AFSDB) 19 X_25 calling address (X25) 20 ISDN calling address (ISDN) 21 Router (RT) 22 NSAP address (NSAP) 23 Reverse NSAP lookup (deprecated) (NSAP-PTR) 24 Security signature (SIG) 25 Security key (KEY) 26 X.400 mail mapping (PX)) 27 Geographical position (withdrawn) (GPOS) 28 Ip6 Address (AAAA) 29 Location Information (LOC) 30 Next domain (security) (NXT) 31 Endpoint identifier (EID) 32 Nimrod Locator (NIMLOC) 33 Server Selection (SRV) 34 ATM Address (ATMA) 35 Naming Authority Pointer (NAPTR) 36 - Key Exchanger (KX) 37 - Certificate (CERT) 38 - IPv6 Host Address (A6) 39 - Name Redirection (DNAME) 40 - Kitchen Sink (SINK) 41 - EDNS0 Option (OPT) 42 - Lists of Address Prefixes (APL) 43- Delegation Signer (DS) Transaction Key(TKEY) Transition Signature - (TSIG) Incremental Transfer - (IXFR) 252 A request for a transfer of an entire zone (AXFR) 253 A request for mailboxrelated records (MAILB, MB, MG, or MR) 254 A request for mail agent RRs (MAILA (Obsolete see MX) 255 A request for any records (ANY) 1-20
31 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description DNSSEC Look aside validation (DLV) The transport layer used for the records of this table entry Number of queries that have been recorded in this table entry dnsservcountertransport dnsservcounterrequests The transport that was used for these queries. 1 The queries reported on this row were sent using UDP. 2 The queries reported on this row were sent using TCP. 3 The queries reported on this row were sent using a transport that was neither TCP nor UDP. Number of requests (queries) that have been recorded in this row of the table. The counter information is accessed as follows: dnsservcounter Requests.<opcode>. <class>.<type>. <transport> The count of requested queries for IN A records over UDP by the server would be: dnsservcounter Requests See also Counter information by OP Code/class/resource record type (p. 1-17). * 1-21
32 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Number of responses that have been recorded in this table entry dnsservcounterresponses Number of responses made by the server since initialization for the kind of query identified on this row of the table. The counter information is accessed as follows: dnsservcounter Responses.<opcode>. <class>.<type>. <transport> The count of query responses for IN A records over UDP by the server would be: dnsservcounter Responses See also Counter information by OP Code/class/resource record type (p. 1-17). * IPv4 requests received dnsservcounterrequestv4 IPv4 requests received. This also counts non-query requests. IPv6 requests received dnsservcounterrequestv6 IPv6 requests received. This also counts non-query requests. Requests with EDNS(0) received Requests with unsupported EDNS version received Requests with TSIG received Requests with SIG(0) received Requests with invalid TSIG or SIG(0) signature received dnsservcounterreqedns0 dnsservcounterreqbadednsver dnsservcounterreqtsig dnsservcounterreqsig0 dnsservcounterreqbadsig Requests with EDNS(0) received. Requests with unsupported EDNS version received. Requests with TSIG received. Requests with SIG(0) received. Requests with invalid TSIG or SIG(0) signature received. TCP requests received dnsservcounterreqtcp TCP requests received. Authoritative (nonrecursive) queries rejected. dnsservcounterauthqryrej Authoritative (non-recursive) queries rejected. Recursive queries rejected dnsservcounterrecqryrej Recursive queries rejected. 1-22
33 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Zone transfer requests rejected dnsservcounterxfrrej Zone transfer requests rejected. Dynamic update requests rejected dnsservcounterupdaterej Dynamic update requests rejected. Responses sent dnsservcounterresponse Responses sent. Truncated responses sent dnsservcountertruncatedresp Truncated responses sent Responses with EDNS(0) sent dnsservcounterrespedns0 Responses with EDNS(0) sent. Responses with TSIG sent dnsservcounterresptsig Responses with TSIG sent. Responses with SIG(0) sent Queries resulted in successful answer. Queries resulted in authoritative answer Queries resulted in nonauthoritative answer Queries resulted in referral answer Queries resulted in in NOERROR responses Queries resulted in SERVFAIL Queries resulted in FORMERR Queries resulted in NXDOMAIN Queries which caused the server to perform recursion dnsservcounterrespsig0 dnsservcounterqrysuccess dnsservcounterqryauthans dnsservcounterqrynoauthans dnsservcounterqryreferral nsservcounterqrynxrrset dnsservcounterqryservfail dnsservcounterqryformerr dnsservcounterqrynxdomain dnsservcounterqryrecursion Responses with SIG(0) sent. Queries resulted in successful answer. This means the query which returns a NOERROR response with at least one answer resource record. Queries resulted in authoritative answer. Queries resulted in nonauthoritative answer. Queries resulted in referral answer. Queries resulted in in NOERROR responses with no data Queries resulted in SERVFAIL. Queries resulted in FORMERR. Queries resulted in NXDOMAIN. Queries which caused the server to perform recursion in order to find the final answer. 1-23
34 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Queries which the server attempted to recurse Queries for which the server discovered an excessive number of existing recursive queries dnsservcounterqryduplicate dnsservcounterqrydropped Queries which the server attempted to recurse but discovered an existing query with the same IP address, port, query ID, name, type and class already being processed. Queries for which the server discovered an excessive number of existing recursive queries for the same name, type and class and were subsequently dropped. Other query failures dnsservcounterqryfailure Other query failures. Requested zone transfers completed Dynamic update requests forwarded Dynamic update responses forwarded Dynamic update forward failed Dynamic updates completed dnsservcounterxfrreqdone dnsservcounterupdatereqfwd dnsservcounterupdaterespfwd dnsservcounterupdatefwdfail dnsservcounterupdatedone Requested zone transfers completed. Dynamic update requests forwarded. Dynamic update responses forwarded. Dynamic update forward failed. Dynamic updates completed. Dynamic updates failed dnsservcounterupdatefail Dynamic updates failed. Dynamic updates rejected dnsservcounterupdatebadprereq Dynamic updates rejected due to prerequisite failure. IPv4 notifies sent dnsservcounterzonemaintnotifyoutv4 IPv4 notifies sent. IPv6 notifies sent dnsservcounterzonemaintnotifyoutv6 IPv6 notifies sent. IPv4 notifies received dnsservcounterzonemaintnotifyinv4 IPv4 notifies received. IPv6 notifies received dnsservcounterzonemaintnotifyinv6 IPv6 notifies received. Incoming notifies rejected dnsservcounterzonemaintnotifyrej Incoming notifies rejected. IPv4 SOA queries sent dnsservcounterzonemaintsoaoutv4 IPv4 SOA queries sent. IPv6 SOA queries sent dnsservcounterzonemaintsoaoutv6 IPv6 SOA queries sent. IPv4 AXFR requested dnsservcounterzonemaintaxfrreqv4 IPv4 AXFR requested. IPv6 AXFR requested dnsservcounterzonemaintaxfrreqv6 IPv6 AXFR requested. 1-24
35 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description IPv4 IXFR requested dnsservcounterzonemaintixfrreqv4 IPv4 IXFR requested. IPv6 IXFR requested dnsservcounterzonemaintixfrreqv6 IPv6 IXFR requested. Zone transfer requests succeeded Zone transfer requests failed dnsservcounterzonemaintxfrsuccess dnsservcounterzonemaintxfrfail Zone transfer requests succeeded. Zone transfer requests failed. Performance/statistic counters by server: Minimum amount of time between receiving two DNS requests Maximum amount of time between receiving two DNS requests Number of seconds since the last DNS request was received dnsservstatminarrivalinterval dnsservstatmaxarrivalinterval dnsservstatlastarrivaltime The minimum amount of time between receiving two DNS request messages. A message is received at the server when the server is able to begin processing the message. This typically occurs immediately after the message is read into server memory. If no messages have been received or the interval is less than 1 ms, this object contains a zero value. The value is in milliseconds. The maximum amount of time between receiving two DNS request messages. A message is received at the server when the server is able to begin processing the message. This typically occurs immediately after the message is read into server memory. If no messages have been received, this object contains a zero value. The value is in milliseconds. The number of seconds since the last valid DNS request message was received by the server. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. 1-25
36 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Minimum response time to authoritative DNS requests dnsservstatauthminresponsetime The smallest time interval measured as the difference between the arrival of a DNS message at the server and the successful transmission of an authoritative response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received or the interval is less than 1 ms, this object contains a zero value. The value is in milliseconds. 1-26
37 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Maximum response time to authoritative DNS requests dnsservstatauthmaxresponsetime The largest time interval measured as the difference between the arrival of a DNS message at the server and the successful transmission of an authoritative response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. The value is in milliseconds. 1-27
38 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Sum of the response times for authoritative DNS requests dnsservstatauthsumresponsetime The sum of the response time intervals (in milliseconds), where a response time interval is measured as the difference between the arrival of a DNS message at the server and the successful transmission of an authoritative response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. The value is in milliseconds. 1-28
39 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Minimum response time to non-authoritative DNS requests dnsservstatnonauthminresponsetime The smallest time interval measured as the difference between the arrival of a DNS message at the server and the successful transmission of a non-authoritative response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received or the interval is less than 1 ms, this object contains a zero value. The value is in milliseconds. 1-29
40 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Maximum response time to non-authoritative DNS requests dnsservstatnonauthmaxresponsetime The largest time interval measured as the difference between the arrival of a DNS message at the server and the successful transmission of a non-authoritative response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. The value is in milliseconds. 1-30
41 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Sum of the response times for non-authoritative DNS requests dnsservstatnonauthsumresponsetime The sum of the response time intervals (in milliseconds), where a response time interval is measured as the difference between the arrival of a DNS message at the server and the successful transmission of an non-authoritative response to that message. A message is received at the server when the server is able to begin processing the message. A message is transmitted after the server has no further use for the message. Note that the operating system may still have the message queued internally. The operating system queue time is not to be considered as part of the response time. Invalid messages do not cause this value to change. If no valid messages have been received, this object contains a zero value. The value is in milliseconds. Object defined configuration and settings: Seconds elapsed when the server is in a persistent state dnsservconfiguptime If the server has a persistent state (for instance, a process), this value is the seconds elapsed since it started. For software without persistent state, this value is zero. 1-31
42 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Seconds elapsed since the last time the name server was reset. Server statistics and zone maintenance statistics are not counted dnsservconfigresettime dnsservconfigqddnssnmpstats If the server has a persistent state (for instance, a process) and supports a reset operation (for instance, can be told to reread configuration files), this value is the seconds elapsed since the last time the name server was reset. For software that does not have persistence state or does not support a reset operation, this value is zero. If the policy snmp-stats is set to no in the qddns block, server statistics and zone maintenance statistics are not counted. All dnsservcounters values are always set to zero. The default value for this policy is yes. When this policy is on, the server and zone maintenance counter variables are incremented twice - once in ISC code and once in qddns code. 1-32
43 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Finds the authoritative name server for that zone and sends a query in UDP dnsservconfigqddnsretrytcpontruncate When a query is sent to a DNS server, it finds the authoritative name server for that zone and sends a query in UDP. If the reply from the recipient authoritative name server is more than 512 bytes, it sends a maximum of 512 bytes of data and also sets truncation bit in the message to the DNS server. When the DNS server receives the reply message from authoritive server, the DNS server sees that the truncation bit is ON. According to DNS protocol, the DNS server initiates a TCP connection with the authoritive server. If TCP is blocked in the firewall, TCP handshake cannot happen and many SYN_SENT half open connections can be seen by running netstat. If too many requests arrive too fast, named runs out of file descriptors and are not able to serve any requests. If the policy retrytcp-on-truncate can be set to no in qddns block of the DNS server, it cannot connect to the authoritive server using TCP. The DNS server replies with the partially received message. 1-33
44 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description Turn off EDNS globally when the name server sends query to a remote name server as a client. Turn off named respond while syncing the journal files to disk. Send dynamic updates to slave zones Send notify messages to slaves zones dnsservconfigqddnsclientedns dnsservconfigqddnssyncjournaltodisk dnsservconfigqddnsallowsecondaryupdate dnsservconfigqddnsnotifyafterload A policy client-ends no can be specified in the qddns block to turn off EDNS globally when the name server sends query to a remote name server as a client. If client-edns is set no, the server configuration with the directive is ignored. The default value for clientedns is yes. The server acts like an ISC server. The default value for this policy is no. If named receives many dynamic updates in master zones or has many slave zones which are obtained via IXFR, named does not respond while syncing the journal files to disk. This is the default behavior of ISC code. This default behavior can be changed with a new policy sync-journal-todisk no; in the qddns block, which stops syncing the journal file to disk. Instead, it flushes the buffer. If the policy allowsecondary-update is set to yes, dynamic updates can be sent to slave zones. The default value is no. After start up, named sends notify messages to slaves zones. To avoid notify message overload, the default behavior is to not send notify messages at start up. The policy notifyafter-load can be set to yes if the default behavior is not desired. 1-34
45 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description IP address of the name server to use in EDUP message IP address of Message Service where the EDUP messages are sent Message service port where the EDUP messages are sent. Organization ID in the EDUP message DNS traps: The DNS Server has started The DNS Server has stopped The DNS has reloaded its configuration The DNS has detected an error in its configuration files dnsservconfigqddnsedupmyip dnsservconfigqddnsedupmessageserviceip dnsservconfigqddnsedupmessageserviceport dnsservconfigqddnseduporgid dnsserverstarted dnsserverstopped dnsserverreload dnsserverconfigerror IP address of the name server to use in EDUP message. IP address of the Message Service where the EDUP messages are sent. Message service port where the EDUP messages are sent. Organization ID added to the EDUP message. Sent by the DNS server when it started. Sent by the DNS server during a normal, smooth, shutdown. Sent by the DNS server when it has been reloaded. Sent by the DNS server when an error occurred while processing the DNS zone files. This trap will be generated only if the following errors occur: The server cannot find a file or directory that has been specified in the configuration. The server has rejected a zone that it is trying to load, due to errors. This trap is also sent if the qddns policy remove-cname-oncname-and-other-dataerror is set to Yes. In that case, the trap message will be CNAME and other data error, removing CNAME: (xyz). 1-35
46 SNMP Support for the Lucent DHCP and DNS Servers Lucent DNS MIB variables Function MIB Variable(s) Description The DNS has dumped its database to disk dnsserverdumped Sent by the DNS server when the DNS database files have been dumped to disk. 1-36
47 SNMP Support for the Lucent DHCP and DNS Servers Trap object IDs (OIDs) Trap object IDs (OIDs) Purpose This section describes the components that comprise an SNMP trap. The Alcatel-Lucent enterprise-specific trap contents are defined by the following: DHCP: IpspgDhcpTrapEntry DNS: IpspgDnsTrapEntry Similar trap variables are defined for both DNS and DHCP, as shown in the following table. Table 1-3 Trap variables IpspgDhcpTrapEntry in dhcp.mib IpspgDnsTrapEntry in named.mib Type Description ipspgdhcptrindex none Integer Indicates which trap is received for dhcp.mib: 1 = dhcpserverstarted 2 = dhcpserverstopped 3 = dhcpserverreload 4 = dhcpserversubnetdepleted 5 = dhcpserverbadpacket 6 = dhcpserverfailoveractive 7 = dhcpserverfailoverreturnedcontrol 8 = dhcpserversubnetthresholdexceeded 9 = dhcpserversubnetthresholddescent 10 = dhcpserverdropunknownclient 11 = dhcpserverpingresponsereceived For a description of the DHCP traps, refer to the DHCP server SNMP traps category at the end of Table 1-1. none ipspgdnstrindex Integer Indicates which trap is received for named.mib: 1 = dnsserverstarted 2 = dnsserverstopped 3 = dnsserverreload 4 = dnsserverconfigerror 5 = dnsserverdumped For a description of the DNS traps, refer to the DNS traps category at the end of Table
48 SNMP Support for the Lucent DHCP and DNS Servers Trap object IDs (OIDs) IpspgDhcpTrapEntry in dhcp.mib IpspgDnsTrapEntry in named.mib Type Description ipspgdhcptrsequence ipspgdnstrsequence Counter Indicates how many times a specific trap is received. This number is a counter that will increment every time a specific trap is received. Such counters are only reset by DHCP and DNS Starts or by a DHCP Restart. ipspgdhcptrid ipspgdnstrid Integer Indicates the application that generated the alarm. Currently, all traps are generated by the Monitor. The value is always 1. ipspgdhcptrtext ipspgdnstrtext 80-char string An ASCII string describing the alarm condition/cause, for example: Lucent DHCP stopped Lucent DNS started ipspgdhcptrpriority ipspgdnstrpriority Integer Indicates the priority level as set on the agent for this class and type of trap. Both the DHCP and DNS servers send traps with the following priorities: 1 (inform) for start, stop, reload, failover returned control, subnet threshold descended, and ping response received. 2 (warning) a bad packet is received. Used when there are errors in the config file and when qddns finds CNAME and other data error in a zone or a file. 3 (minor) when a subnet threshold is exceeded. 4 (major) when a subnet is depleted. 5 (critical) when a failover is activated. ipspgdhcptrclass ipspgdnstrclass Integer This is not used and is set to the value of ipspgdhcptrindex (DHCP) or ipspgdnstrindex (DNS). ipspgdhcptrtype ipspgdnstrtype Integer This is not used and is set to the value of ipspgdhcptrindex (DHCP) or ipspgdnstrindex (DNS). 1-38
49 SNMP Support for the Lucent DHCP and DNS Servers Trap object IDs (OIDs) IpspgDhcpTrapEntry in dhcp.mib IpspgDnsTrapEntry in named.mib Type Description ipspgdhcptrtime ipspgdnstrtime Counter Indicates the time when the trap has occurred. It contains the number of seconds since UNIX epoch (midnight UTC of January 1, 1970). For example, the local time of the sub-agent host is: (which translates to Fri Apr 3 15:48: ) ipspgdhcptrsuspect ipspgdnstrsuspect 32-char string The hostname where the sub-agent (named or dhcpd) is running. ipspgdhcptrdiagid ipspgdnstrdiagid Integer This is not used and is set to the value of ipspgdhcptrindex (DHCP) or ipspgdnstrindex (DNS). Sample DHCP traps The following is sample output from the traprcv utility. The definitions of the ipspgdhcptr family of values are in the above table. Received SNMPv2c Trap: Community: public From: sysuptime.0 = 2 days, 03:56:26.29 snmptrapoid.0 = dhcpserversubnetthresholdexceeded ipspgdhcptrindex = 8 ipspgdhcptrsequence = 1 ipspgdhcptrid = monitor(1) ipspgdhcptrtext = Lucent DHCP Subnet Threshold exceeded for subnet ipspgdhcptrpriority = minor(3) ipspgdhcptrclass = 8 ipspgdhcptrtype = 8 ipspgdhcptrtime = ipspgdhcptrsuspect = qa2k342 ipspgdhcptrdiagid = 8 Received SNMPv2c Trap: Community: public From: sysuptime.0 = 2 days, 04:01:15.06 snmptrapoid.0 = dhcpserversubnetdepleted ipspgdhcptrindex = 4 ipspgdhcptrsequence = 1 ipspgdhcptrid = monitor(1) ipspgdhcptrtext = Lucent DHCP Subnet Depleted for subnet
50 SNMP Support for the Lucent DHCP and DNS Servers Trap object IDs (OIDs) Sample DNS traps ipspgdhcptrpriority = major(4) ipspgdhcptrclass = 4 ipspgdhcptrtype = 4 ipspgdhcptrtime = ipspgdhcptrsuspect = qa2k342 ipspgdhcptrdiagid = 4 The following is sample output from the traprcv utility. The definitions of the ipspgdnstr family of values are in the above table. Received SNMPv2c Trap: Community: public From: sysuptime.0 = 00:10:09.16 snmptrapoid.0 = dnsserverstarted ipspgdnstrindex = 1 ipspgdnstrsequence = 1 ipspgdnstrid = monitor(1) ipspgdnstrtext = Lucent DNS started ipspgdnstrpriority = inform(1) ipspgdnstrclass = 1 ipspgdnstrtype = 1 ipspgdnstrtime = ipspgdnstrsuspect = spirit ipspgdnstrdiagid = 1 Received SNMPv2c Trap: Community: public From: sysuptime.0 = 00:10:09.61 snmptrapoid.0 = dnsserverstopped ipspgdnstrindex = 2 ipspgdnstrsequence = 1 ipspgdnstrid = monitor(1) ipspgdnstrtext = Lucent DNS stopped ipspgdnstrpriority = inform(1) ipspgdnstrclass = 2 ipspgdnstrtype = 2 ipspgdnstrtime = ipspgdnstrsuspect = spirit ipspgdnstrdiagid =
51 SNMP Support for the Lucent DHCP and DNS Servers Trap object IDs (OIDs) Querying ipspgdhcptrapentry and ipspgdnstrapentry tables and variables Trap table rolling An administrator can query the DHCP and DNS trap tables by using the gettab or getmany commands. An administrator can also use a getone command to query a specific component of a thrown trap. For example, ipspgdhcptrtext.15 would return the text value of the 15th trap in the table. Likewise, ipspgdnstrtime.10 would return the time that the 10th trap in the ipspgdnstrapentry table was thrown. The ipspgdhcptraptable and ipspgdnstraptable only hold up to 31 entries each. When the 32nd DHCP or DNS trap is thrown, the TrapTable clears and the 32nd trap becomes the sole entry in it respective table. This behavior will repeat for each trap that is a multiple of
52 SNMP Support for the Lucent DHCP and DNS Servers Trap object IDs (OIDs) 1-42
53 2 Install and configure the SNMP Module Overview Purpose This chapter describes how to install the SNMP Module on Windows and UNIX platforms. It concludes with instructions on how to configure the SNMP Module. This information presents the following topics. Installation and configuration order 2 Install the SNMP Module on Windows 3 Uninstall the SNMP Module from Windows 10 Install SNMP Module on a UNIX platform 13 Configure the SNMP Master Agent 21 Configure additional user names 22 Configure additional SNMPv1/v2c notification traps 24 Configure additional SNMPv3 notification traps
54 Install and configure the SNMP Module Installation and configuration order Installation and configuration order Purpose Procedure Use these steps as a guide to install and configure the SNMP Module. To successfully install and configure the agents, follow these steps: 1 Obtain the Alcatel-Lucent SNMP Distribution media. Refer to the SNMP Module Release Notes for instructions. 2 Complete the pre-installation task. Refer to the SNMP Module Release Notes for more information. 3 Back up your system before proceeding. 4 Install the DHCP and DNS SNMP Agents. (The SNMP Master Agent and utilities are installed and configured as part of this process.) 5 Start the Master SNMP Agent. 6 Verify the configuration and installation using built-in SNMP utilities. Refer to Chapter 3, Start the SNMP Master Agent for instructions.... E ND OF STEPS 2-2
55 Install and configure the SNMP Module Install the SNMP Module on Windows Install the SNMP Module on Windows Purpose Procedure Use this procedure to install the SNMP Module on Windows. Perform the following steps to install the SNMP Module on Windows: 1 Exit all Windows programs that are currently running. 2 Click Start. Select the Run menu. Enter the drive letter and directory where the installation software has been loaded (for example, x:\setup.exe) and click OK. Result: The InstallShield Wizard opens. 3 Click Next. 2-3
56 Install and configure the SNMP Module Install the SNMP Module on Windows Result: The License Agreement window opens. 4 After reviewing the license agreement, click I accept the terms of the license agreement and click Next. 2-4
57 Install and configure the SNMP Module Install the SNMP Module on Windows Result: The VitalQIP installation directory window opens. 5 This window displays the directory where the VitalQIP software is installed. Select the default directory or click Browse to select a different directory. 6 Click Next. 2-5
58 Install and configure the SNMP Module Install the SNMP Module on Windows Result: The SNMP Module installation directory window opens. 7 This window displays the directory where the SNMP Module software is to be installed. Select the default directory or click Browse to select a different directory. 8 Click Next. 2-6
59 Install and configure the SNMP Module Install the SNMP Module on Windows Result: The SNMP Module features window opens. 9 This window displays the options that are available for installation on this system. Select or clear the options to install the Lucent DHCP or Lucent DNS SNMP subagent components. If no DHCP Server is installed, the message A Lucent DHCP Service is not installed in this system. Please unselect DHCP SNMP Agent Server and then proceed appears in a dialog box. If no DNS Server is installed, the message A Lucent DNS Service is not installed in this system. Please unselect DNS SNMP Agent Server and then proceed appears in a dialog box. Click Back. Unselect the features that are not installed and then proceed with the installation. 10 Click Next. 2-7
60 Install and configure the SNMP Module Install the SNMP Module on Windows Result: The Summary window opens. 11 After verifying all settings, click Next. 2-8
61 Install and configure the SNMP Module Install the SNMP Module on Windows Result: The Summary window opens. 12 Click Finish.... E ND OF STEPS 2-9
62 Install and configure the SNMP Module Uninstall the SNMP Module from Windows Uninstall the SNMP Module from Windows Purpose Procedure This section describes how to uninstall the SNMP Module. Uninstall the SNMP Module as follows: 1 Under the Windows Control Panel, click Add/Remove Programs. Result: The Add/Remove Programs Properties window opens. 2 Select VitalQIPVitalQIP SNMP Module, and click Change/Remove. Result: The Install shield for uninstalling the SNMP Module window opens. 3 Click Next. 2-10
63 Install and configure the SNMP Module Uninstall the SNMP Module from Windows Result: The Summary window opens. 4 After verifying all settings, click Next. 2-11
64 Install and configure the SNMP Module Uninstall the SNMP Module from Windows Result: The Summary window opens. 5 Click Finish.... E ND OF STEPS 2-12
65 Install and configure the SNMP Module Install SNMP Module on a UNIX platform Install SNMP Module on a UNIX platform Purpose Use this procedure to install SNMP on UNIX. Before you begin Before executing the load command, ensure the cshrc or shrc command is run to set the correct $QIPHOME environment. If DHCP is selected, the library libqsidhcpsnmp.so is copied to $QIPHOME/usr/lib. The earliest version of the Lucent DHCP Server (dhcpd) that must already exist is Version 5.5, Build 9. If DNS is selected, the library libqsidnssnmp.so is copied to $QIPHOME/usr/lib. The earliest version of Lucent DNS Server (named) that must already exist is Version 4.2, Build 9. The SNMP-enabling modules are copied to $QIPHOME/snmp. The current shrc and cshrc environment files, which already exist in $QIPHOME/etc, are modified to include the following environment variables: PATH=$QIPHOME/snmp/bin:$PATH SR_MGR_CONF_DIR=$QIPHOME/snmp/config SR_AGT_CONF_DIR=$QIPHOME/snmp/config The log and template files created by this installation are located in $QIPHOME/log. The installation on UNIX creates the following directory structures: $QIPHOME/snmp/config - The directory containing the SNMP Agent configuration files. $QIPHOME/snmp/bin - The directory containing the SNMP Master Agent and utilities. Procedure Perform the following steps to install the SNMP Module on a UNIX platform: 1 Execute one of the following commands: Platform Linux Solaris Executable./snmp23SetupLinux.bin./snmp23SetupSolaris.bin 2-13
66 Install and configure the SNMP Module Install SNMP Module on a UNIX platform Result: The InstallShield Wizard opens. 2 Click Next. 2-14
67 Install and configure the SNMP Module Install SNMP Module on a UNIX platform Result: The License agreement window opens. 3 After reviewing the license agreement, click I accept the terms of the license agreement and click Next. 2-15
68 Install and configure the SNMP Module Install SNMP Module on a UNIX platform Result: The VitalQIP installation directory window opens. 4 This window displays the directory where the VitalQIP software is installed. Select the default directory or click Browse to select a different directory. 5 Click Next. 2-16
69 Install and configure the SNMP Module Install SNMP Module on a UNIX platform Result: The SNMP Module installation directory window opens. 6 This window displays the directory where the SNMP Module software is to be installed. Select the default directory or click Browse to select a different directory. 7 Click Next. 2-17
70 Install and configure the SNMP Module Install SNMP Module on a UNIX platform Result: The SNMP Module features window opens. 8 This window displays the options that are available for installation on this system. Select or clear the options to install the Lucent DHCP or Lucent DNS SNMP subagent components. If no DHCP Server is installed, the message A Lucent DHCP Service is not installed in this system. Please unselect DHCP SNMP Agent Server and then proceed appears in a dialog box. If no DNS Server is installed, the message A Lucent DNS Service is not installed in this system. Please unselect DNS SNMP Agent Server and then proceed appears in a dialog box. Click Back. Unselect the features that are not installed and then proceed with the installation. 9 Click Next. 2-18
71 Install and configure the SNMP Module Install SNMP Module on a UNIX platform Result: The Summary window opens. 10 After verifying all settings, click Next. 2-19
72 Install and configure the SNMP Module Install SNMP Module on a UNIX platform Result: The Summary window opens. 11 Click Finish.... E ND OF STEPS 2-20
73 Install and configure the SNMP Module Configure the SNMP Master Agent Configure the SNMP Master Agent Before using the SNMP Module, you must configure the Master Agent. This involves the following: Configuring additional user names At installation time, the SNMP Master Agent configuration file (snmpd.cnf) is set up with a default user name of Guest. To use SNMPv3, a user name must be specified within an SNMPv3 Protocol Data Unit (PDU). You can define additional user names in the SNMP Master Agent configuration file, snmpd.cnf. Refer to Configure additional user names (p. 22) for instructions. Configure notifications/traps You can configure the Network Management station destination IP address(es) and parameters to handle the reception of Notifications/Traps from SNMP-enabled DHCP and DNS Servers. Multiple Management Station destinations can be defined by adding additional lines in the snmpd.cnf file, as detailed in Configure additional SNMPv1/v2c notification traps (p. 24) and Configure additional SNMPv3 notification traps (p. 26). 2-21
74 Install and configure the SNMP Module Configure additional user names Configure additional user names Purpose Procedure Use this procedure to specify a user name within an SNMPv3 Protocol Data Unit (PDU). Follow these steps: 1 To begin, choose one of the following actions. If you are on... UNIX Windows Then... Enter the following commands: cd $QIPHOME/snmp/config vi snmpd.cnf Open a command window and enter the following command (or open the file in Notepad): edit %QIPHOME%\snmp\config\snmpd.cnf 2 When the snmpd.cnf file is open, find the usmuserentry section, which specifies the default user name of Guest: usmuserentry localsnmpid Guest usmnoauthprotocol\ usmnoprivprotocol nonvolatile - Additional user name entries can be made in this section by adding a new line in the format above, substituting the default Guest with the new user name. See Appendix A, Increase SNMP Module security to set security and privacy levels. 3 When new user names are added to this configuration file, security modifications must be made in the vacmsecuritytogroupentry section to view the MIB: vacmsecuritytogroupentry usm Guest SystemAdmin nonvolatile Refer to Appendix A, Increase SNMP Module security for additional information Note: It is optional to retain the default user name Guest. If the default user name is not removed, SNMPv3 access using the Guest user name remains available. 4 You must restart the Master Agent to complete the Master Agent configuration changes. 2-22
75 Install and configure the SNMP Module Configure additional user names Note: If you want to stop the SNMP Master Agent while a DNS or DHCP Server that is SNMP-enabled is running, you must stop the SNMP-enabled service(s) before stopping SNMP. Start the SNMP Master Agent and then the SNMP-enabled service(s).... E ND OF STEPS 2-23
76 Install and configure the SNMP Module Configure additional SNMPv1/v2c notification traps Configure additional SNMPv1/v2c notification traps Purpose Use this procedure to send SNMPv1/v2 traps to a different Management Station destination. Before you begin If the Management Station is running on the same machine as the DHCP or DNS Servers, do not make any changes. The default Trap destination is set to local host. If the Network Management station is running on a different machine than the DHCP or DNS Servers to be managed, add additional lines to snmpd.cnf containing the IP addresses of the Management Stations in dotted decimal format. Follow the procedure to restart the Master Agent. Procedure Follow these steps: 1 Open the snmpd.cnf file in an text editor. 2 Locate the following line in the snmptargetaddrentry section: snmptargetaddrentry 31 snmpudpdomain : Console \ v1exampleparams nonvolatile :0 Note: For SNMPv2, the line will contain v2cexampleparams instead. 3 Copy and paste this line and then change the new 31 entry to a unique value. 4 Change the loopback address ( ) to the IP address of the Management Station you want to receive the trap. Note: The Network Mask entry (default: :0) can also be modified at this time. However, Alcatel-Lucent recommends that you do not change this value without first consulting your account representative. 5 Change the Description tag Console in the copied string to a unique Description tag. 2-24
77 Install and configure the SNMP Module Configure additional SNMPv1/v2c notification traps 6 Locate the following line in the snmpnotifyentry section: snmpnotifyentry 31 Console trap nonvolatile 7 Copy and paste this line and then change the new 31 entry to the value that you assigned the snmptargetaddrentry line in Step 3 above. 8 Change the Description tag Console in the copied string to the unique value you selected in Step 5. 9 Save the changes to the snmpd.cnf file. 10 Stop the DHCP and/or DNS server. 11 Stop the SNMP Master Agent. 12 Restart the Master Agent, then the DHCP and/or the DNS server.... E ND OF STEPS 2-25
78 Install and configure the SNMP Module Configure additional SNMPv3 notification traps Configure additional SNMPv3 notification traps Purpose Use this procedure to send SNMPv3 traps to a different Management Station destination. Before you begin If the Management Station is running on the same machine as the DHCP or DNS Servers, do not make any changes. The default Trap destination is set to local host. If the Network Management station is running on a different machine than the DHCP or DNS Servers to be managed, add additional lines to snmpd.cnf containing the IP addresses of the Management Stations in dotted decimal format. Follow the procedure to restart the Master Agent. Procedure Follow these steps: 1 Open the snmpd.cnf file in an text editor. 2 Locate the following line in the snmptargetaddrentry section: snmptargetaddrentry 33 snmpudpdomain : TrapSink \ v3exampleparams nonvolatile :0 3 Copy and paste this line and then change the second 33 entry to a unique value. 4 Change the loopback address ( ) to the IP address of the Management Station you want to receive the trap. Note: The Network Mask entry (default: :0) can also be modified at this time. 5 Change the Description tag TrapSink in the copied string to a unique description tag of your choice. 6 Locate the following line in the snmpnotifyentry section: snmpnotifyentry 32 TrapSink trap nonvolatile 2-26
79 Install and configure the SNMP Module Configure additional SNMPv3 notification traps 7 Copy and paste this line and then change the second 32 to the value that you assigned the snmptargetaddrentry line in Step 3 above. 8 Change the second TrapSink to the unique tag value in Step 5. 9 Save the changes to the snmpd.cnf file. 10 Stop the DHCP and/or DNS server. 11 Stop the SNMP Master Agent. 12 Restart the Master Agent, then the DHCP and/or the DNS server.... E ND OF STEPS 2-27
80 Install and configure the SNMP Module Configure additional SNMPv3 notification traps 2-28
81 3 Start the SNMP Master Agent Overview Purpose This chapter describes how to start the SNMP Agent and how to verify the SNMP MIB access of the DHCP/DNS server. You must perform these tasks before using the SNMP Module. This information presents the following topics. Start the SNMP Master Agent on UNIX 2 Start the SNMP Master Agent on Windows 3 Verification of DHCP/DNS server SNMP MIB access 6 Additional information
82 Start the SNMP Master Agent Start the SNMP Master Agent on UNIX Start the SNMP Master Agent on UNIX Purpose Use this procedure to start the SNMP Master Agent on UNIX. Before you begin You must always start the SNMP Master Agent before starting either the DHCP or DNS server. If the SNMP Master agent is restarted, the DHCP and DNS server must also be restarted. Use the following command to start the SNMP Master Agent on the remote server. cd $QIPHOME/etc./qip-snmp-startup If either the DHCP or DNS servers are started via the system startup script, ensure the script performs the startup in the following sequence, with the startup of your DHCP and DNS servers coming LAST (after the SNMP Master Agent):. Procedure Follow these steps: 1 Ensure the environment is set as performed by the $QIPHOME/etc cshrc (or shrc) file. 2 Start the SNMP Master Agent by using the $QIPHOME/etc/qip-snmp-startup file. 3 Start the DHCP or DNS server.... E ND OF STEPS 3-2
83 Start the SNMP Master Agent Start the SNMP Master Agent on Windows Start the SNMP Master Agent on Windows Purpose Use this procedure to start the SNMP Research Master Agent on Windows. Before you begin This process assumes that the installation was successful and the Registry entries were created. The SNMP Master Agent must always be started before starting either the DHCP or DNS server. If the master agent is restarted, then the DHCP and/or DNS server must also be restarted. You may want to create a service dependency; see your system administrator or Windows documentation for the appropriate steps. Procedure Follow these steps: 1 Start the VitalQIP Service Controller application. (This can be found in the Start Programs Alcatel-Lucent VitalQIP program group.) Result: The Service Controller window opens. 2 Click Configure. 3-3
84 Start the SNMP Master Agent Start the SNMP Master Agent on Windows Result: The Configure Services window opens. 3 Click Select Services. Result: The Managed Services window opens. 4 Click Search. Result: This populates the Available Services list box. 5 From the Available Services list box, highlight the SNMP EMANATE Master Agent and click Add. Result: SNMP EMANATE Master Agent appears in the Managed Services list box. 6 Click OK when you are done. 7 Click OK in the Configure Services window. 3-4
85 Start the SNMP Master Agent Start the SNMP Master Agent on Windows 8 Start the SNMP EMANATE Master Agent by highlighting the service and clicking Start on the Service Controller. 9 Start the Lucent DHCP Server by highlighting the service and clicking Start on the Service Controller. 10 Start the Lucent DNS Server by highlighting the service and clicking Start on the Service Controller.... E ND OF STEPS 3-5
86 Start the SNMP Master Agent Verification of DHCP/DNS server SNMP MIB access Verification of DHCP/DNS server SNMP MIB access Purpose Your installation of SNMP includes utilities to verify SNMP operations, and to ensure that the SNMP Module has been properly installed and configured according to the instructions in this manual. To verify the operation of SNMP, complete the verification procedure. Refer to Verification on UNIX (p. 6) for Windows. Before you begin If you attempt to query the SNMP Agent for DHCP values before the initial DCHP file generation, a DHCP server error may occur. Before querying the SNMP Agent for DHCP values, ensure the DHCP Server is configured and running. For information on DHCP file generation, refer to the VitalQIP Administrator Reference Manual. Verification on UNIX To verify DHCP/DNS SNMP MIB access on UNIX, follow these steps: 1 Login to the target system and obtain a terminal. 2 Ensure the cshrc or shrc command is run to set the correct $QIPHOME environment. 3 Verify that the SNMP Master Agent is running by issuing the following command: ps ef grep snmpdm 4 If the SNMP Master Agent is not running, start it as described in Start the SNMP Master Agent on UNIX (p. 2). 3-6
87 Start the SNMP Master Agent Verification of DHCP/DNS server SNMP MIB access 5 Verify that the DHCP and DNS servers are started. If they are not started, start them according to the instructions in the VitalQIP User s Guide. For... DNS DHCP Then.. Run the test script file: $QIPHOME/snmp/bin/TestDNS Note: This test requires that localhost represent the current Hostname. Result: The Output indicates if the test was successful: If verification passes, the DNS service description and version are returned. The following output displays for a successful test: SUCCESS: Dns Server Subagent Test dnsservsystemdescr.0 = Lucent QDDNS <VERSION_INFO> If verification fails, the DNS service description and version are not returned. The following output displays for an unsuccessful test: FAILURE: Error code set in packet - No such variable name. Index: 1. Run the test script file: $QIPHOME/snmp/bin/TestDHCP Note: This test requires that localhost represents the current Hostname Result: The Output indicates if the test was successful: If verification passes, the DHCP service description and version are returned. The following output displays for a successful test: SUCCESS: DHCP Server Subagent Test dhcpservsystemdescr.0 = (Version: <VERSION_INFO> - Lucent DHCP Server) If verification fails, the DHCP service description and version are not returned. The following output displays for an unsuccessful test: FAILURE: Error code set in packet - No such variable name. Index: E ND OF STEPS Verification on Windows To verify the DHCP/DNS Server SNMP access on a Windows platform, follow these steps: 3-7
88 Start the SNMP Master Agent Verification of DHCP/DNS server SNMP MIB access 1 Verify that the SNMP Master Agent is running. 2 From the Control Panel, select Services. 3 Scroll through the list of services and verify that SNMP EMANATE Master Agent is in the Started state. 4 Verify that the DHCP and DNS servers are started. If they are not started, start them according to the instructions in the VitalQIP User s Guide. 3-8
89 Start the SNMP Master Agent Verification of DHCP/DNS server SNMP MIB access 5 From a MS-DOS command window, perform the following actions. For... DNS DHCP Then.. Run the test batch file from the home directory: %QIPHOME%\snmp\bin\TestDNS Note: This test requires that localhost represent the current Hostname. Result: The Output indicates if the test was successful: If verification passes, the DNS service description and version are returned. The following output displays for a successful test: SUCCESS: dnsservsystemdescr.0 = Lucent QDDNS <VERSION_INFO> If verification fails, the DNS service description and version are not returned. The following output displays for an unsuccessful test: FAILURE: Error code set in packet - No such variable name. Index: 1. Run the test batch file from the home directory: %QIPHOME%\snmp\bin\TestDHCP Note: This test requires that localhost represent the current Hostname. Result: Output is returned that indicates if verification passes: If verification passes, the DHCP service description and version are returned. The following output displays for a successful test: SUCCESS: dhcpservsystemdescr.0 = (Version: <VERSION_INFO> - Lucent DHCP Server) If verification fails, the DHCP service description and version are not returned. The following output displays for an unsuccessful test: FAILURE: Error code set in packet - No such variable name. Index: E ND OF STEPS 3-9
90 Start the SNMP Master Agent Additional information Additional information The Lucent DHCP and DNS MIB files are automatically installed on your system during the installation of the SNMP Module. These files can be used to load into a network management system, such as HP Openview. On Windows, the file locations are: %QIPHOME%\snmp\config\dhcp.mib (DHCP MIB) %QIPHOME%\snmp\config\named.mib (DNS MIB) On UNIX, the file locations are: $QIPHOME/snmp/config/dhcp.mib (DHCP MIB) $QIPHOME/snmp/config/named.mib (DNS MIB) The Lucent DHCP and DNS MIBs are vendor specific. 3-10
91 4 Console and template installations Overview Purpose Contents This chapter covers the SNMP console and template installation. This chapter covers these topics. Console installation 4-2 Overview 4-2 Install SNMP with console installation 4-3 Template installation 4-5 Overview 4-5 Install SNMP using a template
92 Console and template installations Overview Console installation Overview How a console installation differs from the standard installation The console installation is a text-based installation. Since the console installation is not GUI-based, it is much faster. All the information that is collected in the regular SNMP installation appears as prompts in the console installation. The console installation is not dependent upon platforms. 4-2
93 Console and template installations Install SNMP with console installation Install SNMP with console installation Purpose You can also install SNMP by using InstallShield s console option. The console opens a separate screen, and displays the text mode of the install package, and thus is much faster. The console installation can be used when you are unable to use the GUI installation. For instance, the console installation can be used when an X display cannot be exported or when you are installing over a slow WAN. Start the installation Follow these steps: 1 The table below shows the commands to start a console installation. Table 4-1 Start the installation If you are installing on... Then... Windows 1. Exit all Windows programs that you are currently running. 2. From your desktop, click Start and select Run. The Run screen opens. 3. Type: cmd 4. From the command prompt, change to the directory where the SNMP installation file is located: cd <drive>:\<path to directory> 5. Type: x:\snmp23setupwin32.exe -console Where x: is the location of the copied installation binary. Linux or Solaris 1. If SNMP daemons are running from an already installed version, stop all SNMP processes. 2. Change to the directory where the SNMP installation file is located: cd <path to directory> 3. Execute: For Linux:./snmp23SetupLinux.bin -console For Solaris:./snmp23SetupSolaris.bin -console 4-3
94 Console and template installations Install SNMP with console installation 2 Follow the same steps and answer at the same prompts as you do for the standard installation of SNMP.... E ND OF STEPS 4-4
95 Console and template installations Overview Template installation Overview How template installation differs from the standard installation Template installation steps The template installation runs the standard installation and creates a template. The template can then be transported from one machine to another and used to install SNMP on multiple machines. The template installation is performed in two steps: 1. The template is recorded and created during an installation. 2. The template is used to install on additional servers. 4-5
96 Console and template installations Install SNMP using a template Install SNMP using a template Purpose This section provides instructions on how to use a template installation. Record and create the template The table below shows the commands used to create a template file for an installation. Note: If you do not give a full path to the template file, the template file will be created in the current directory. Note: There is no space between -options and -record. Once an installation has been successfully completed using the install package, the template file will be created upon the reboot of the machine for Windows. No reboot is required for UNIX. Table 4-2 Start the installation If you are installing on... Then... Windows 1. Exit all Windows programs that you are currently running. 2. From your desktop, click Start and select Run. The Run screen opens. 3. Type: cmd 4. From the command prompt, change to the directory where the SNMP installation file is located: cd <drive>:\<path to directory> 5. Type: x:\snmp23setupwin32.exe -options-record <template_file> Where x: is the location of the copied installation binary. Note: If you do not specify the path for <template_file>, the template file is created in the local directory. 4-6
97 Console and template installations Install SNMP using a template If you are installing on... Then... Linux or Solaris 1. If SNMP daemons are running from an already installed version, stop them. 2. Change to the directory where the SNMP installation file is located: cd <path to directory> 3. Execute: For Linux:./snmp23SetupLinux.bin -options-record <template_file> For Solaris:./snmp23SetupSolaris.bin -options-record <template_file> Use the template to install SNMP If you want to use this template to install SNMP on another machine, you will need to modify some data. Depending upon the type of installation, change the appropriate information for the computer using the template. Then type: Windows: snmp23setupwin32.exe -options <template_file> Linux:./snmp23SetupLinux.bin -options <template_file> Solaris:./snmp23SetupSolaris.bin -options <template_file> This command will start the installer with the data already populated, according to the template file being used. Silent mode If you need to use the silent mode (no user input is required for the installer s prompts; installation is run based on the template entries), type: Windows: snmp23setupwin32.exe -options <template_file> -silent Linux:./snmp23SetupLinux.bin -options <template_file> -silent Solaris:./snmp23SetupSolaris.bin -options <template_file> -silent Note: On Windows, you must reboot the machine after running an installation in Silent Mode. The installation program will not reboot the machine automatically. 4-7
98 Console and template installations Install SNMP using a template 4-8
99 A Increase SNMP Module security Overview Purpose This appendix covers adding additional security to the SNMP Module. Security can be enhanced by limiting SNMPv1 and SNMPv2c access to MIB variables. User name and passwords can be protected in SNMPv3. This information presents the following topics. Limit SNMPv1 and SNMPv2c access to MIB variables 2 SNMPv3 security 5 Set authentication and privacy protocols for SNMPv3 8 A-1
100 Increase SNMP Module security Limit SNMPv1 and SNMPv2c access to MIB variables Limit SNMPv1 and SNMPv2c access to MIB variables Purpose Procedure MIB variables can be queried by anyone who knows the default community. The SNMP Module restricts "public" access so the majority of the configuration tree is unavailable to "public" access. This restricted "public" access may not be enough in some environments. In cases where restricted "public" access is not enough, modifying the <VitalQIP_directory>/snmp/config/snmpd.cnf file can prevent the "public" community from receiving answers to queries. To do so, search the <VitalQIP_directory>/snmp/config/snmpd.cnf file for two "Anyone" entries under the acmaccessentry section and modify them as follows: vacmaccessentry Anyone - snmpv1 noauthnopriv \ exact - - CfgProt nonvolatile vacmaccessentry Anyone - snmpv2c noauthnopriv \ exact - - CfgProt nonvolatile Alcatel-Lucent does not recommend the "public" community to be deleted. Additional communities can be defined as described. To change the community name string, follow these steps: 1 Using a text editor, open the <VitalQIP_directory>/SNMP/config/snmpd.cnf file. 2 In the snmpd.cnf file, define a group and its associated access right in the vacmaccessentry section. The following example uses "group1" for the new group: #Entry type: vacmaccessentry #Format: vacmgroupname (text) # vacmaccesscontextprefix (text) # vacmaccesssecuritymodel (snmpv1, snmpv2c, snmpv2s, usm) # vacmaccesssecuritylevel (noauthnopriv, authnopriv, authpriv) # vacmaccesscontextmatch (exact, prefix) # vacmaccessreadviewname (text) # vacmaccesswriteviewname (text) # vacmaccessnotifyviewname (text) # vacmaccessstoragetype (nonvolatile, permanent, readonly) vacmaccessentry group1 - snmpv1 noauthnopriv exact All All All nonvolatile vacmaccessentry group1 - snmpv2c noauthnopriv exact All All All nonvolatile A-2
101 Increase SNMP Module security Limit SNMPv1 and SNMPv2c access to MIB variables 3 Associate the community name to the group in the vacmsecuritytogroupentry section. The following example uses "CommunA" as the community name: #Entry type: vacmsecuritytogroupentry #Format: vacmsecuritymodel (snmpv1, snmpv2c, snmpv2s, usm) # vacmsecurityname (text) # vacmgroupname (text) # vacmsecuritytogroupstoragetype (nonvolatile, permanent, readonly) vacmsecuritytogroupentry snmpv1 CommunA group1 nonvolatile vacmsecuritytogroupentry snmpv2c CommunA group1 nonvolatile 4 To add the new community (in the above example CommunA), add an entry to the snmpcommunityentry section. The snmpcommunityentry section contains a list of all active communities. Increment the snmpcommunityindex. For SNMP v1/v2c, the snmpcommunityname and the snmpcommunitysecurityname are the same, and both values should contain the new community name. The snmpcommunitytransporttag contains a dash (-) unless an Access Control List (ACL) value is required. In the following example, an ACL value called CommunALocation is used (and is set up in the next step): ##Entry type: snmpcommunityentry #Format: snmpcommunityindex (text) # snmpcommunityname (text) # snmpcommunitysecurityname (text) # snmpcommunitycontextengineid (octectstring) # snmpcommunitycontextname (text) # snmpcommunitytransporttag (text) # snmpcommunitystoragetype (nonvolatile, permenant, readonly) snmpcommunityentry t public public localsnmpid - - nonvolatile snmpcommunityentry t CommunA CommunA localsnmpid - \ CommunALocation nonvolatile 5 Optional. To further restrict the use of this community from a specific workstation in the snmptargetaddrentry section, add a line similar to the following example (the example uses "CommunALocation" as the name of the ACL value): #Entry type: snmptargetaddrentry #Format: snmptargetaddrname (text) # snmptargetaddrtdomain (snmpudpdomain, snmpipxdomain, etc.) # snmptargetaddrtaddress (transport address,such as # :0) A-3
102 Increase SNMP Module security Limit SNMPv1 and SNMPv2c access to MIB variables # snmptargetaddrtimeout (integer) # snmptargetaddrretrycount (integer) # snmptargetaddrtaglist (text) # snmptargetaddrparams (text) # snmptargetaddrstoragetype (nonvolatile, permanent, readonly) # snmptargetaddrtmask (transport mask, i.e :0) # snmptargetaddrmms (integer) snmptargetaddrentry 81 snmpudpdomain : CommunALocation \ v1exampleparams nonvolatile : snmptargetaddrentry 82 snmpudpdomain : CommunALocation \ v2cexampleparams nonvolatile : Save the snmpd.cnf file. 7 Restart the master agent and services.... E ND OF STEPS A-4
103 Increase SNMP Module security SNMPv3 security SNMPv3 security Purpose SNMPv3 offers additional security features that are not available in earlier versions of the SNMP protocol. SNMPv3 supports the use of a user name and password protection. Authentication and privacy protocols are also supported to further protect the SNMP packets on the network. Setting these protocols provides additional security if SNMP packets are not filtered by a firewall. Basic SNMPv3 security can be added by setting up user name and password protection. This does not involve the use of authentication and privacy protocols. For more information about setting up SNMPv3 security with authentication and privacy protocols, see Set authentication and privacy protocols for SNMPv3 (p. 8). Otherwise, follow the steps in the section to establish basic user name and password protection. Before you begin Before setting the user name and password protection, obtain the following information: User name User Group Station location/name IP address of monitoring console Engine ID Note: The engine ID is different for each host. The engine ID can be obtained by querying the server with the following command: getone -v1 <IP_address_of_station_querying> public snmpengineid.0. The snmpengineid is written to the configuration files as a colon-delimited value, such as 00:00:00:63:00:00:00:A1:0A:00:00:03. Also, consider if the user should have Get Access privileges, Set Access privileges, and receive traps. Set user privileges To set user privileges, follow these steps: 1 Using a text editor, open the <VitalQIP_directory>/snmp/config/snmpd.cnf file on the DHCP/DNS server running the Master Agent. A-5
104 Increase SNMP Module security SNMPv3 security 2 In the snmpd.cnf file, add the following lines: usmuserentry localsnmpid <user_name> usmnoauthprotocol usmnoprivprotocol \ nonvolatile \ <station_location/name> - - vacmaccessentry <group> - usm noauthnopriv exact All - All nonvolatile vacmsecuritytogroupentry usm <user_name> <group> nonvolatile vacmviewtreefamilyentry All iso - included nonvolatile snmptargetaddrentry <arbitrary_tag> snmpudpdomain \ <monitoring_console's_ip_addresss>:0 \ <station_name/location> v3exampleparams nonvolatile \ : Note: In most cases, the vacmviewtreefamilyentry line is already in the snmpd.cnf file. When the SNMP Master Agent is restarted, all lines are rewritten under the correct headings. It does not matter where the lines are entered in the file. User privileges can vary from those shown above. User permissions can be set by changing the parameters of the vacmaccessentry line. Change the parameters as follows; in all cases, the "All" value sets the privilege and "-" denies the privilege: For the Get Access privilege, set the sixth parameter. For the Set Access privilege, set the seventh parameter. For the Trap Sending privilege, set the eighth parameter. 3 If the user is required to receive traps, set the trap Sending privilege to All and add the following lines: snmpnotifyentry <arbitrary_tag> <station_name/location> nonvolatile snmptargetparamsentry v3exampleparams 3 usm <user_name> noauthnopriv \ nonvolatile 4 Save the snmpd.cnf file.... E ND OF STEPS A-6
105 Increase SNMP Module security SNMPv3 security Restart the Master Agent If the user is set to send traps, the trap receiving station can be set to collect and decode traps from the user's DHCP/DNS server. To configure the receiving station, follow these steps: 1 Using a text editor, open the <VitalQIP_directory>/snmp/config/mgr.cnf file on the monitor console running the Master Agent. 2 In the mgr.cnf file, add the following lines: usmuserentry <engine_id> <user_name> \ usmnoauthprotocol usmnoprivprotocol nonvolatile Save the mgr.cnf file. 4 Start TRAPRCV or other trap catching utility.... E ND OF STEPS A-7
106 Increase SNMP Module security Set authentication and privacy protocols for SNMPv3 Set authentication and privacy protocols for SNMPv3 Purpose SNMPv3 authentication and privacy protocols can be used to secure SNMP queries. Authentication and privacy protocols are a more advanced security feature than user name and password protection. These protocols prevent unauthorized users from altering intransit SNMP messages generated on behalf of an authorized user and prevent another user from assuming the identity of another user that has the appropriate authorizations. For in-depth information about these protocols, refer to RFC RFC 2574 can be obtained at To set up SNMPv3 authentication and privacy protocols, use the steps in this section. Before you begin Set up the user Before beginning, gather the following information: User name User group Authentication protocol - None, MD5, or SHA Privacy Protocol - None or DES The MIB tree levels available for viewing: None All Another view defined in vacmviewtreefamilyentry section Monitoring station location Monitoring station ID tag Monitoring station IP address SNMPv3 user parameter tag Engine ID Note: The engine ID is different for each host. The engine ID can be obtained by querying the server with getone -v1 <IP_address_of_station_querying> public snmpengineid.0. The snmpengineid is written to the configuration files as a colon delimited value, such as 00:00:00:63:00:00:00:A1:0A:00:00:03. To set up a user, follow these steps: A-8
107 Increase SNMP Module security Set authentication and privacy protocols for SNMPv3 1 Using a text editor, open the <VitalQIP_directory>/snmp/config/snmpd.cnf file. 2 Add or modify the following sections: usmuserentry snmpengineid <user_name> \ usmnoauthprotocol usmhmacmd5authprotocol usmhmacshaauthprotocol \ usmnoprivprotocol usmdesprivprotocol nonvolatile \ <monitoring_station_location> \ <authentication_password_or_-_for_no_password> \ <privacy_password_or_-_for_none> vacmaccessentry <name_of_user_group> <context_prefix_leave_as_a_-> usm \ noauthnopriv authnopriv authpriv exact <view_level_for_get> \ <view_level_for_set> \ <view_level_for_traps> nonvolatile vacmsecuritytogroupentry usm <user_defined_in_usmuserentry> \ <group_defined_in_vacmaccessentry> \ nonvolatile Note: The authentication and privacy passwords are encrypted when snmpd is started. Once one group is set up, several users with the same authentication and privacy levels can be associated to it. Take care when adding lines to the vacmaccessentry section of snmpd.cnf. This section sets the minimum security allowed for user groups. If you assign an authpriv user to a group that has noauthnopriv attribute, that user will be able to query using both the defined authpriv passwords and NULL passwords. The following example shows a user set up to view the entire MIB variable tree: usmuserentry localsnmpid User usmhmacmd5authprotocol usmdesprivprotocol \ nonvolatile AuthPass \ PrivPass vacmaccessentry Group - usm AuthPriv exact All - - nonvolatile vacmsecuritytogroupentry usm User Group nonvolatile 3 If needed, you can restrict a user to only perform queries from a specific workstation by adding the monitoring station s location in the usmuserentry section. The snmptargetaddrentry section must be modified to include the monitoring station s location as follows: snmptargetaddrentry <monitoring_station_id_tag> snmpudpdomain \ <monitoring_station_ip_address>: <monitoring_station_location> \ <v3_user_parameter_tag>\ A-9
108 Increase SNMP Module security Set authentication and privacy protocols for SNMPv3 nonvolatile :0 The following example is of a user who is limited to reading the MIB variables from the workstation The example uses MD5 authentication and DES privacy protocols. usmuserentry localsnmpid User usmhmacmd5authprotocol usmdesprivprotocol \ nonvolatile \ Workstation AuthPass PrivPass vacmaccessentry Group - usm AuthPriv exact All - - nonvolatile vacmsecuritytogroupentry usm User Group nonvolatile snmptargetaddrentry 98 snmpudpdomain :0 0 0 Workstation - \ nonvolatile :0 4 Save the snmpd.cnf file. 5 Stop and restart snmpd for the changes to take effect. Result: Once the SNMPv3 is configured, the user will be prompted for a name and password when doing a SNMPv3 query. The getone utility included with the SNMP distribution checks the <VitalQIP_directory>/snmp/config/mgr.cnf file for information about the user. A user without an entry is prompted for authentication and privacy passwords for each query. By default, the SNMP master agent assumes that authentication is in the form of clear text or MD5. Note: While the getone utility offers password prompts for SHA authentication users, it does not authenticate them. The SHA password must be added to the mgr.cnf file as described below. The need to type passwords can be eliminated by adding the user authentication protocol, privacy protocol, and passwords. This is required in order to use SHA authentication. To do so, add or modify the following sections in the <VitalQIP_directory>/snmp/config/mgr.cnf file: usmuserentry snmpengineid User_from_previous_section \ usmnoauthprotocol usmhmacmd5authprotocol usmhmacshaauthprotocol \ usmnoprivprotocol usmdesprivprotocol nonvolatile \ <monitoring_station_location> \ "Authentication_Password_in_Quotes" "Privacy_Password_in_Quotes" The following is an example of a modified usmuserentry section using SHA authentication on a remote SNMP monitoring station: usmuserentry 00:00:00:63:00:00:00:a1:0a:33:00:05 \ User usmhmacshaauthprotocol \ usmdesprivprotocol nonvolatile - "AuthPass" "PrivPass"... E ND OF STEPS A-10
109 Increase SNMP Module security Set authentication and privacy protocols for SNMPv3 Configure to receive and send SNMP traps Traps can be sent from the server using the same privacy protocols that are used to get and set MIB variables. Be aware that using users added in "2. Set up the User" is discouraged as the user may be restricted to using a certain workstation. Instead, create separate users with trap privileges to secure SNMP against unauthorized MIB variable queries from a restricted IP address. To do so, follow these steps: 1 Using a text editor, open the <VitalQIP_directory>/snmp/config/snmpd.cnf file. 2 Add or modify the following section as follows: usmuserentry snmpengineid User_Name \ usmnoauthprotocol usmhmacmd5authprotocol usmhmacshaauthprotocol \ usmnoprivprotocol usmdesprivprotocol nonvolatile \ <monitoring_station_location> \ <authentication_password_or_-_for no password> \ <privacy_password_or_-_for_none> vacmaccessentry <name_of_user_group> <context_prefix_leave_as_a_- usm> \ noauthnopriv authnopriv authpriv exact <view_level_for_get> \ <view_level_for_set> <view_level_for_traps> nonvolatile vacmsecuritytogroupentry usm <user_defined_in_usmuserentry> \ <group_defined_in_vacmaccessentry> \ nonvolatile snmpnotifyentry <monitor_station_id_tag> <monitor_station_location> trap \ nonvolatile snmptargetaddrentry <monitoring_station_id_tag> snmpudpdomain \ <monitoring_station_ip_address>: <monitoring_station_location> \ <v3_user_parameter_tag> \ nonvolatile :0 snmptargetparmentry <v3_user_parameters_tag> 3 usm <user_name> \ NoAuthPriv authnopriv authpriv nonvolatile Note: The authentication and privacy passwords are encrypted when snmpd is started. Once one group is set up, several users with the same authentication and privacy levels can be associated to it. The following is an example of a modified snmpd.cnf file. The user is Trapper and can only receive traps using MD5 and DES privacy protocol. The monitoring station IP address is , its location is northcampus, and its tag is 99. usmuserentry localsnmpid Trapper usmhmacmd5authprotocol usmdesprivprotocol \ nonvolatile \ A-11
110 Increase SNMP Module security Set authentication and privacy protocols for SNMPv3 AuthPass PrivPass vacmaccessentry Group - usm AuthPriv exact - - All nonvolatile vacmsecuritytogroupentry usm Trapper Group nonvolatile snmpnotifyentry 99 northcampus trap nonvolatile snmptargetaddrentry 99 snmpudpdomain : northcampus \ v3trapperparams nonvolatile \ :0 \ snmptargetparamsentry v3trapperparams usm Trapper AuthPriv nonvolatile 3 Save the snmpd.cnf file. 4 Stop and restart snmpd to begin broadcasting traps. 5 After the server is configured, all trap receiving utilities must be configured to receive traps. With the SNMP Module, the traprcv utility is distributed to test functionality of the trap process. It is not intended to be used as a monitoring and reporting tool. To configure this utility to obtain the user s information defined above, follow these steps: a. Using a text file editor, open the <VitalQIP_directory>/snmp/config/mgr.cnf file. b. In the usmuserentry section, add the user as shown in the following example: UsmUserEntry 00:00:00:63:00:00:00a1:0a:33:00:05 Trapper \ UsmHMACMD5AuthProtocol \ usmdesprivprotocol nonvolatile - AuthPass PrivPass c. Save the mgr.cnf file.... E ND OF STEPS A-12
111 Index... C... D Configuring Additional User Names, 2-22 Configuring Notifications/Traps, 2-24 Counter Information by Server, 1-3 Counter Information for Bootp Packets, 1-4 Counter Information for DHCP Packets, 1-4 DHCP and Bootp Statistics by Subnet and/or Address Pool, 1-10 DHCP server MIB variables, 1-3 DHCPMIB Counter Information by Server, 1-3 dhcpservbootpcountdroppedno tservingsubnet, 1-4 dhcpservbootpcountdroppedun knownclients, 1-4 dhcpservbootpcountinvalids, 1-4 dhcpservbootpcountreplies, 1-4 dhcpservbootpcountrequests, 1-4 dhcpservbootpstatlastarrivalti me, 1-6 dhcpservbootpstatmaxarrivalin terval, 1-6 dhcpservbootpstatmaxresponse Time, 1-7 dhcpservbootpstatminarrivalint erval, 1-5 dhcpservbootpstatminresponse Time, 1-6 dhcpservbootpstatsumresponse Time, 1-7 dhcpservcountfullsubnets, 1-4 dhcpservcountunusedsubnets, 1-4 dhcpservcountusedsubnets, 1-3 dhcpservdhcpcountacks, 1-5 dhcpservdhcpcountdeclines, 1-5 dhcpservdhcpcountdiscovers, 1-4 dhcpservdhcpcountdroppednot ServingSubnet, 1-5 dhcpservdhcpcountdroppedun knownclient, 1-5 dhcpservdhcpcountinforms, 1-5 dhcpservdhcpcountinvalids, 1-5 dhcpservdhcpcountnacks, 1-5 dhcpservdhcpcountoffers, 1-5 dhcpservdhcpcountreleases, 1-5 dhcpservdhcpcountrequests, 1-5 dhcpservdhcpstatlastarrivalti me, 1-8 dhcpservdhcpstatmaxarrivalint erval, 1-8 dhcpservdhcpstatmaxresponse Time, 1-9 dhcpservdhcpstatminarrivalint erval, 1-8 dhcpservdhcpstatminresponse Time, 1-9 dhcpservdhcpstatsumresponse Time, 1-10 dhcpserverreload, 1-14 dhcpserverstarted, 1-14 dhcpserverstopped, 1-14 dhcpserversubnetdepleted, 1-15 dhcpservrangeend, 1-11 dhcpservrangeinuse, 1-11 dhcpservrangeoutstandingoffer s, 1-11 dhcpservrangestart, 1-11 dhcpservrangesubnetmask, 1-10 dhcpservrangetype, 1-12 dhcpservrangeunavailable, 1-11 dhcpservrangeunused, 1-12 dhcpservsystemdescr, 1-3 dhcpservsystemresettime, 1-3 dhcpservsystemstatus, 1-3 dhcpservsystemuptime, 1-3 DNS MIB, 3-10 DNS Traps, 1-35 DNSMIB Performance/Statistic Counters by Server, 1-25 dnsservconfigqddnsallowseco ndaryupdate, 1-34 dnsservconfigqddnsclientedns, 1-34 dnsservconfigqddnsedupmessa geserviceip, 1-35 dnsservconfigqddnsedupmessa geserviceport, 1-35 IN-1
112 Index dnsservconfigqddnsedupmyip, 1-35 dnsservconfigqddnseduporgid, 1-35 dnsservconfigqddnsnotifyafter Load, 1-34 dnsservconfigqddnsretrytcpo ntruncate, 1-33 dnsservconfigqddnssnmpstats, 1-32 dnsservconfigqddnssyncjourna ltodisk, 1-34 dnsservconfigresettime, 1-17, 1-32 dnsservconfiguptime, 1-17, 1-31 dnsservcounterauthqryrej, 1-22 dnsservcounteropcode, 1-18 dnsservcounterqryauthans, 1-23 dnsservcounterqrydropped, 1-24 dnsservcounterqryduplicate, 1-24 dnsservcounterqryfailure, 1-24 dnsservcounterqryformerr, 1-23 dnsservcounterqrynoauthans, 1-23 dnsservcounterqrynxdomai N, 1-23 dnsservcounterqryrecursion, 1-23 dnsservcounterqryreferral, 1-23 dnsservcounterqryservfail, 1-23 dnsservcounterqrysuccess, 1-23 dnsservcounterrecqryrej, 1-22 dnsservcounterreqbadednsv er, 1-22 dnsservcounterreqbadsig, 1-22 dnsservcounterreqedns0, 1-22 dnsservcounterreqsig0, 1-22 dnsservcounterreqtcp, 1-22 dnsservcounterreqtsig, 1-22 dnsservcounterrequests, 1-21 dnsservcounterrequestv4, 1-22 dnsservcounterrequestv6, 1-22 dnsservcounterrespedns0, 1-23 dnsservcounterresponse, 1-23 dnsservcounterresponses, 1-22 dnsservcounterrespsig0, 1-23 dnsservcounterresptsig, 1-23 dnsservcountertransport, 1-18 dnsservcountertruncatedresp, 1-23 dnsservcounterupdatebadprere q, 1-24 dnsservcounterupdatedone, 1-24 dnsservcounterupdatefail, 1-24 dnsservcounterupdatefwdfail, 1-24 dnsservcounterupdaterej, 1-23 dnsservcounterupdatereqfwd, 1-24 dnsservcounterupdaterespfwd, 1-24 dnsservcounterxfrrej, 1-23 dnsservcounterxfrreqdone, 1-24 dnsservcounterzonemaintaxf RReqv4, 1-24 dnsservcounterzonemaintaxf RReqv6, 1-24 dnsservcounterzonemaintixfr Reqv4, 1-25 dnsservcounterzonemaintixfr Reqv6, 1-25 dnsservcounterzonemaintnotif yinv4, 1-24 dnsservcounterzonemaintnotif yinv6, 1-24 dnsservcounterzonemaintnotif youtv4, 1-24 dnsservcounterzonemaintnotif youtv6, 1-24 dnsservcounterzonemaintnotif yrej, 1-24 dnsservcounterzonemaintsoa Outv4, 1-24 dnsservcounterzonemaintsoa Outv6, 1-24 dnsservcounterzonemaintxfrf ail, 1-25 dnsservcounterzonemaintxfrs uccess, 1-25 dnsserverconfigerror, 1-35 dnsserverdumped, 1-36 dnsserverreload, 1-35 dnsserverstarted, 1-35 dnsserverstopped, 1-35 dnsservstatauthmaxresponset ime, 1-27 dnsservstatauthminresponseti me, 1-26 dnsservstatauthsumresponset ime, 1-28 dnsservstatlastarrivaltime, 1-25 dnsservstatmaxarrivalinterval, 1-25 dnsservstatminarrivalinterval, 1-25 dnsservstatnonauthmaxrespo nsetime, 1-30 IN-2
113 Index... H dnsservstatnonauthminrespon setime, 1-29 dnsservstatnonauthsumrespon setime, 1-31 dnsservsystemdescr, 1-17 dnsservsystemstatus, 1-17 How a console installation differs from the standard installation, 4-2 HP Openview, 1-2, I IETF, M MIB Variables, 1-3, N nsservcounterqrynxrrset, O Operational Information, 1-2, 1-3, 1-17 DHCP MIB, 1-3 DNS MIB, T snmpd.cnf, 2-21 SNMPV1, 1-2 SNMPV2, 1-2 SNMPV3, 1-2, 2-21, 2-22 Starting the SNMP Agent on UNIX, 3-2 Starting the SNMP Agent on Windows NT/2000, 3-3 Statistical/Performance Information for DHCP Packets, 1-7 technical support, viii template installation, U Uninstalling SNMP, V Verification of DHCP/DNS Server s SNMP MIB Access, P Performance/Statistic Counters by Server, Q qipsnmp-load, R RFC1611, S Service Controller, 3-3 SNMP console installation, 4-3 template installation, 4-6 SNMP Master Agent Configuration, 2-21 IN-3
114 Index IN-4
Networking Domain Name System
System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information
Networking Domain Name System
System i Networking Domain Name System Version 6 Release 1 System i Networking Domain Name System Version 6 Release 1 Note Before using this information and the product it supports, read the information
DNS ActiveX Control for Microsoft Windows. Copyright Magneto Software All rights reserved
DNS ActiveX Control for Microsoft Windows Copyright Magneto Software All rights reserved 1 DNS Overview... 3 1.1 Introduction... 3 1.2 Usage... 3 1.3 Property... 4 1.4 Event... 4 1.5 Method... 4 1.6 Error
Networking Domain Name System
IBM i Networking Domain Name System Version 7.2 IBM i Networking Domain Name System Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page
Monitoring Techniques for Cisco Network Registrar
White Paper Monitoring Techniques for Cisco Network Registrar White Paper 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 14 Introduction...
DNS Conformance Test Specification For Client
DNS Conformance Test Specification For Client Revision 1.0 Yokogawa Electric Corporation References This test specification focus on following DNS related RFCs. RFC 1034 DOMAIN NAMES - CONCEPTS AND FACILITIES
netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.
Application Protocols for TCP/IP Administration
Application Protocols for TCP/IP Administration BootP, TFTP, DHCP Agenda BootP TFTP DHCP BootP, TFTP, DHCP, v4.4 2 Page 60-1 BootP (RFC 951, 1542, 2132) BootP was developed to replace RARP capabilities
VitalQIP DNS/DHCP & IP Management Software. DHCP Configuration Manager Release 1.0. User s Guide
VitalQIP DNS/DHCP & IP Management Software DHCP Configuration Manager Release 1.0 User s Guide 190-409-122R1.0 Issue 2 July 2009 Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks
My Services Online Service Support. User Guide for DNS and NTP services
My Services Online Service Support User Guide for DNS and NTP services Table of Contents 1 MY SERVICES... 3 2 ACCESSING MY SERVICES VIA THE INTERNET... 3 2.1 Logging into My Services... 3 2.2 My Services
Bulk DNS Update CSV File
Bulk DNS Updates Bulk DNS Update CSV File Each line in the comma-separated value (CSV) file represents a resource record. A line break must follow each line, and the file may contain up to 5000 lines.
LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide
LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide Document Release: September 2011 Part Number: LL600027-00ELS090000 This manual supports LogLogic Microsoft DNS Release 1.0 and later,
Using WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
How to Configure DNS Zones
How to Configure DNS Zones The Barracuda NG Firewall DNS configuration object contains two predefined zones: _template and. To be able to edit and specify DNS zones within the Barracuda NG Firewall DNS
A DHCP Primer. Dario Laverde, [email protected]. 2002 Dario Laverde
A DHCP Primer Dario Laverde, [email protected] 2002 Dario Laverde Dynamic Host Configuration Protocol DHCP Client DHCP DHCP Server Dynamic Host Configuration consists of at least an IP address in
DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30)
DNS Some advanced topics Karst Koymans (with Niels Sijm) Informatics Institute University of Amsterdam (version 2.6, 2013/09/19 10:55:30) Friday, September 13, 2013 Karst Koymans (with Niels Sijm) (UvA)
7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
Administrator s Guide
Administrator s Guide Citrix Network Manager for MetaFrame XPe Version 1.0 Citrix Systems, Inc. Information in this document is subject to change without notice. Companies, names, and data used in examples
Array Networks NetContinuum. Netli. Fine Ground. StrangeLoop. Akamai. Barracuda. Aptimize. Inkra. Nortel. Juniper. Cisco. Brocade/Foundry.
Array Networks NetContinuum Netli Barracuda StrangeLoop Inkra Fine Ground Aptimize Akamai Cisco Citrix Juniper Zeus Radware Nortel ActivNetworks Brocade/Foundry Swan Labs A10 Redline Coyote Point Crescendo
Table of Contents DNS. How to package DNS messages. Wire? DNS on the wire. Some advanced topics. Encoding of domain names.
Table of Contents DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 154, 2015/09/14 10:44:10) Friday, September 11, 2015 DNS on the wire Encoding of domain names
Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure
iseries DNS iseries DNS Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule
DNS zone transfers from FreeIPA to non-freeipa slave servers
FreeIPA Training Series DNS zone transfers from FreeIPA to non-freeipa slave servers FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-03-2013 Text file based
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
Copyright 2012 http://itfreetraining.com
In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the
Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.
VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)
KB259302 - Windows 2000 DNS Event Messages 1 Through 1614
Page 1 of 6 Knowledge Base Windows 2000 DNS Event Messages 1 Through 1614 PSS ID Number: 259302 Article Last Modified on 10/29/2003 The information in this article applies to: Microsoft Windows 2000 Server
Introduction to DNS CHAPTER 5. In This Chapter
297 CHAPTER 5 Introduction to DNS Domain Name System (DNS) enables you to use hierarchical, friendly names to easily locate computers and other resources on an IP network. The following sections describe
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Nimsoft Monitor. dns_response Guide. v1.6 series
Nimsoft Monitor dns_response Guide v1.6 series CA Nimsoft Monitor Copyright Notice This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
CHAPTER ANSWERS IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE
CHAPTER S IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE 2 TEXTBOOK CHAPTER 1 S: IMPLEMENTING DHCP CHAPTER 1 IMPLEMENTING DHCP CHAPTER REVIEW QUESTIONS 1.
Section 1 Overview... 4. Section 2 Home... 5
ecogent User Guide 2012 Cogent Communications, Inc. All rights reserved. Every effort has been made to ensure that the information in this User Guide is accurate. Information in this document is subject
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
DHCP Failover. Necessary for a secure and stable network. DHCP Failover White Paper Page 1
DHCP Failover Necessary for a secure and stable network DHCP Failover White Paper Page 1 Table of Contents 1. Introduction... 3 2. Basic DHCP Redundancy... 3 3. VitalQIP Failover Solution... 5 4. VitalQIP
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2003-2005
Leveraging Best Practices for SolarWinds IP Address Manager
Leveraging Best Practices for SolarWinds IP Address Manager Share: Leveraging Best Practices for SolarWinds IPAM SolarWinds IP Address Manager (IPAM) is a comprehensive IP address management solution that
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
How to Add Domains and DNS Records
How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.
User Guide. Informatica Smart Plug-in for HP Operations Manager. (Version 8.5.1)
User Guide Informatica Smart Plug-in for HP Operations Manager (Version 8.5.1) Informatica Smart Plug-in for HP Operations Manager User Guide Version 8.5.1 December 2008 Copyright 2008 Informatica Corporation.
HOST AUTO CONFIGURATION (BOOTP, DHCP)
Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration
Module 2. Configuring and Troubleshooting DNS. Contents:
Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring
Gaia Syslog Messages. Technical Reference Guide. 25 February 2014. Classification: [Protected]
Gaia s Technical Reference Guide 25 February 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright
Windows 2008 Server. Domain Name System Administración SSII
Windows 2008 Server Domain Name System Administración SSII Contenidos Introducción Configuración DNS Transferencia de zona Herramientas DNS Introducción Domain Name System is a hierarchical distributed
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
State of the Cloud DNS Report
transparency for the cloud State of the Cloud DNS Report Basic Edition April 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare
SNMP Monitoring and SWG MIB
SNMP Monitoring and SWG MIB Secure Web Gateway Release 10.0 Manual Version 1.01 M86 SECURITY SNMP MONITORING AND SWG MIB 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version
Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes
Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION Transaction Signatures (TSIG) provide a secure method for communicating in the Domain Name System (DNS) from a primary to a secondary
HP Load Balancing Module
HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.
Teldat Router. DNS Client
Teldat Router DNS Client Doc. DM723-I Rev. 10.00 March, 2003 INDEX Chapter 1 Domain Name System...1 1. Introduction...2 2. Resolution of domains...3 2.1. Domain names resolver functionality...4 2.2. Functionality
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
Module 6: Managing and Monitoring Domain Name System
Module 6: Managing and Monitoring Domain Name System Contents Overview 1 Lesson: Managing DNS Records 2 Lesson: Testing the DNS Server Configuration 11 Lesson: Monitoring DNS Server Performance 24 Lab:
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
ehealth Integration for Cisco VPN Solutions Center User Guide
ehealth Integration for Cisco VPN Solutions Center User Guide MN-NHVPNSC-001 June 2003 Important Notice Concord Communications, Inc., ehealth, ehealth Suite, the Concord Logo, eroi, AdvantEDGE, SystemEDGE,
Network Monitoring with SNMP
Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP
Dell Compellent Storage Center
Dell Compellent Storage Center Active Directory Integration Best Practices Guide Dell Compellent Technical Solutions Group January, 2013 THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY, AND
Understanding DNS (the Domain Name System)
Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2
VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution
VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution May 2011 7.3 Version 1 Copyright 2011 Alcatel-Lucent 1 Table of Contents 1. Document Purpose... 3 2. What s New in VitalQIP 7.3?...
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Installing and Setting up Microsoft DNS Server
Training Installing and Setting up Microsoft DNS Server Introduction Versions Used Windows Server 2003 Setup Used i. Server Name = martini ii. Credentials: User = Administrator, Password = password iii.
Step-by-Step Guide for Setting Up IPv6 in a Test Lab
Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6
Software Version 5.1 November, 2014. Xerox Device Agent User Guide
Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or
Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace
Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all
DHCP and DNS Services
CHAPTER 9 A DHCP server provides network configuration parameters, such as IP addresses, to DHCP clients. The security appliance can provide DHCP server or DHCP relay services to DHCP clients attached
DNS + DHCP. Michael Tsai 2015/04/27
DNS + DHCP Michael Tsai 2015/04/27 lubuntu.ova http://goo.gl/bax8b8 DNS + DHCP DNS: domain name < > IP address DHCP: gives you a IP + configuration when you joins a new network DHCP = Dynamic Host Configuration
INTEGRATING VITALQIP WITH MICROSOFT WINDOWS NETWORKING/ ACTIVE DIRECTORY
INTEGRATING VITALQIP WITH MICROSOFT WINDOWS NETWORKING/ ACTIVE DIRECTORY USE VITALQIP TO CENTRALLY MANAGE WINDOWS DEPLOYMENTS STRATEGIC WHITE PAPER This white paper addresses: Meaning of Active Directory
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection
State of the Cloud DNS Report
transparency for the cloud State of the Cloud DNS Report Basic Edition August 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare
Domain Name System Security
Abstract Domain Name System Security Ladislav Hagara [email protected] Department of Automated Command Systems and Informatics Military Academy in Brno Brno, Czech Republic Domain Name System (DNS) is one of
Configuring DNS. Finding Feature Information
The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
How-to: DNS Enumeration
25-04-2010 Author: Mohd Izhar Ali Email: [email protected] Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS
Some advanced topics. Karst Koymans. Friday, September 11, 2015
DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 154, 2015/09/14 10:44:10) Friday, September 11, 2015 Karst Koymans (UvA) DNS Friday, September 11, 2015 1 /
NQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
How To Use Trustwave Secure Web Gateway On A Linux System (Amd64) With A Libbb) On A Windows 7.5.2 (Amd32) Or Windows 7 (Amd86) (Amd66) (Or Windows 7
Secure Web Gateway SNMP Monitoring and TW MIB Legal Notice Copyright 2014 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying,
How to Configure the Windows DNS Server
Windows 2003 How to Configure the Windows DNS Server How to Configure the Windows DNS Server Objective This document demonstrates how to configure domains and record on the Windows 2003 DNS Server. Windows
NetIQ Advanced Authentication Framework - MacOS Client
NetIQ Advanced Authentication Framework - MacOS Client Installation Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 About MacOS Client 4 System Requirements
SolarWinds. Understanding SolarWinds Charts and Graphs Technical Reference
SolarWinds Understanding SolarWinds Charts and Graphs Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any
How To Plan Out Your Own Version Of Hpl (Dhcp) On A Network With A Network (Dns) On Your Network (Dhpl) On An Ipad Or Ipad On A Pc Or Ipa On A Server On A
System i Networking Dynamic Host Configuration Protocol Version 5 Release 4 System i Networking Dynamic Host Configuration Protocol Version 5 Release 4 Note Before using this information and the product
ADP CollectAll Manager v2.4 User s Guide
ADP CollectAll Manager v2.4 User s Guide ADP CollectAll Manager Version 2.4 User s Guide 2007 Automatic Data Processing, Inc. ADP provides this publication as is without warranty of any kind, either express
Tech Note Cisco IOS SNMP Traps Supported and How to Conf
Tech Note Cisco IOS SNMP Traps Supported and How to Conf Table of Contents Cisco IOS SNMP Traps Supported and How to Configure Them...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Network Monitoring with SNMP
Network Monitoring with SNMP This document describes how SNMP is used in WhatsUp Gold v11 and provides examples on how to configure performance, active, and passive monitors. Introduction SNMP (Simple
Configuration Notes 0215
Mediatrix Digital and Analog VoIP Gateways DNS SRV Configuration for a Redundant Server Solution (SIP) Introduction... 2 Deployment Scenario... 2 DNS SRV (RFC 2782)... 3 Microsoft Server Configuration...
Silect Software s MP Author
Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
Studio 5.0 User s Guide
Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
VitalQIP DNS/DHCP & IP Management Software
VitalQIP DNS/DHCP & IP Management Software Audit Manager Release 1.7 User s Guide 190-409-034R7.1 Issue 1 August 2007 This document contains proprietary information of Alcatel-Lucent and is not to be disclosed
CA Spectrum. Service Performance Manager User Guide. Release 9.4
CA Spectrum Service Performance Manager User Guide Release 9.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Using SolarWinds Orion for Cisco Assessments
Using SolarWinds Orion for Cisco Assessments Cisco Network Assessments Registering Your Assessment... 1 Installing SolarWinds Orion Network Performance Monitor... 1 Discovering Your Network... 1 Polling
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
CA Spectrum and CA Performance Center
CA Spectrum and CA Performance Center Integration Guide CA Spectrum Release 9.3 - CA Performance Center r2.3.00 This Documentation, which includes embedded help systems and electronically distributed materials,
Oracle Communications Network Charging and Control. Session Initiation Protocol (SIP) Protocol Implementation Conformance Statement Release 5.0.
Oracle Communications Network Charging and Control Session Initiation Protocol (SIP) Protocol Implementation Conformance Statement Release 5.0.2 July 2014 Copyright Copyright 2014, Oracle and/or its affiliates.
