Introduction to Simple Network Management Protocol (SNMP)

Similar documents
Simple Network Management Protocol

Network Management & Security (CS 330) RMON

SNMP Simple Network Management Protocol

RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

Cisco CMTS Router MIB Overview

Network Management Functions RMON1, RMON2. Network Management

Using RMON to Manage Remote Networks Gilbert Held

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

Simple Network Management Protocol

SNMP -overview. Based on: W.Stallings Data and Computer Communications

A Guide to Understanding SNMP

SNMP Basics BUPT/QMUL

Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

Lecture 5: Foundation of Network Management

Configuring SNMP Monitoring

Comparison of SNMP. Versions 1, 2 and 3

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

Outline of the SNMP Framework

Configuring Simple Network Management Protocol (SNMP)

Top-Down Network Design

TELE 301 Network Management

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras

MANAGING NETWORK COMPONENTS USING SNMP

Brocade Product Training

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions

(Refer Slide Time: 1:17-1:40 min)

Chapter 18. Network Management Basics

NNMi120 Network Node Manager i Software 9.x Essentials

Network Management (NETW-1001)

Simple Network Management Protocol

Simple Network Management Protocol

Operations Manager: Network Monitoring

Simple Network Management Protocol (SNMP) Primer

DC70 NETWORK MANAGEMENT JUN 2015

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

SNMP Version 3. Finding Feature Information. Information About SNMP Version 3. Security Features in SNMP Version 3

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008

A Summary of Network Traffic Monitoring and Analysis Techniques

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide

SNMP. Simple Network Management Protocol

Performance Management

SNMP and Network Management

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

SNMP Network Management Concepts

ITEC310 Computer Networks II

Network Management Functions - Performance. Network Management

Table of Contents. Overview...2. System Requirements...3. Hardware...3. Software...3. Loading and Unloading MIB's...3. Settings...

Overview of Routing between Virtual LANs

Simulation of an SNMP Agent: Operations, Analysis and Results

OM2012 Network Monitoring. Phil Bracher Sr. Premier Field Engineer Microsoft Corporation

Protocols and Architecture. Protocol Architecture.

Tech Note Cisco IOS SNMP Traps Supported and How to Conf

SNMP Monitoring: One Critical Component to Network Management

Presented by Aurang Zeb 14CS-03. Network Management System

SolarWinds Certified Professional. Exam Preparation Guide

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and

Visio Enabled Solution: One-Click Switched Network Vision

Jean Parrend 1/6 SNMP. Content. 1. Introduction...1

Network Management - SNMP

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

SNMP SNMP Overview CHAPTER

Auditing the LAN with Network Discovery

System and Network Management

Oracle WebLogic Server

Chapter 2 - The TCP/IP and OSI Networking Models

BEA WebLogic Server. and BEA WebLogic Express. SNMP Management Guide

Network Data Monitoring and Analysis. Computer Networks Lecture's Seminar Lecturer:Assoc.Prof.Turgay ĠBRĠKÇĠ Prepared by Çağla TERLĠKCĠOĞULLARI

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Table of Contents. Cisco Fault Management of ONS Using Simple Network Management Protocol

Network Management and Monitoring Software

Lecture 12: Network Management Architecture

Monitoring Oracle WebLogic Server with SNMP 12c (12.2.1)

How To Manage A Network With Kepware

Network Management 2. Learning Objectives. Centralized network management? School of Business Eastern Illinois University

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

SNMP Test er Manual 2015 Paessler AG

Network Management System (NMS) FAQ

Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.

Network Monitoring with SNMP

Network Monitoring & Management Introduction to SNMP

Mathatma Gandhi University

Introduction to Network Management

R07. IV B.Tech. II Semester Regular Examinations, April, NETWORK MANAGEMENT SYSTEMS (Information Technology)

These options allow you to define baseline settings for how scanning will occur on your network

Network Troubleshooting with the LinkView Classic Network Analyzer

HP IMC User Behavior Auditor

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

How To Understand and Configure Your Network for IntraVUE

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Data Communication and Computer Network

Consolidating HFC Device and Network Management and Monitoring under SCTE HMS SNMP

Network System Design Lesson Objectives

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

Configuring and Monitoring Citrix Branch Repeater

Transcription:

Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite which enables network managers to monitor, configure, and troubleshoot the network, and to plan for network growth. One of the reasons why SNMP is referred to as simple is because of its small number of commands. With SNMP, vendors can easily build agents to their products, and this has led to the widespread use of network management today. SNMP Architecture SNMP is based on a manager and agents model. The manager is the console where network management functions are performed, and the agents are the entities or software modules that interface with the actual devices being managed. These managed objects are arranged in a virtual information database known as a Management Information Base (MIB). Management System (NMS) Managed Device Manager Agent Human Network Manager Management Database Network Management Management Database Managed Objects Figure 1. Manager/Agent Model for SNMP D-Link Australia & NZ Page 1 of 13

The SNMP manager and agent use a MIB and relatively small set of commands to exchange information of the managed devices that contain network nodes or managed objects. These objects may include bridges, hubs, routers, firewalls, printers, computers, and network servers, configuration parameters, performance statistics, and others. An object identifier (OID) is assigned to distinguish each variable uniquely in the MIB and SNMP messages. The SNMP manager is typically implemented as a Network Management Station (NMS) using full SNMP protocol. It is able to query, get response from, set variables in, and acknowledge asynchronous events from agents. A typical SNMP agent usually implements the full SNMP protocol. It stores and retrieves management data that is defined by the MIB. Managed devices are monitored and controlled using four basic SNMP commands: read, write, trap, and traversal operations. - The NMS uses the Read command to monitor managed devices. It can examine different variables that are maintained by managed devices. - The NMS uses the Write command to control managed devices. It can change the values of variables stored within managed devices. - The managed devices use Trap command to asynchronously report events to the NMS. The managed devices will send a trap to the NMS when some types of events occur. - The NMS uses traversal operations to determine which variables a managed device can support and to sequentially gather information into tables. In a paradigm for network management using a manager and agent architecture, managed objects must be logically accessible. This means the management information must be stored at a place where information may be retrieved or modified. This can be performed using SNMP. In addition, each managed object must also have a name, syntax, and an encoding. The names used must uniquely identify the object. The syntax defines the data type, and the encoding describes how information associated with the managed objects is serialized for transmission between machines. D-Link Australia & NZ Page 2 of 13

Management Information Base (MIB) A Management Information Base (MIB) is a collection of information which define the properties of managed objects. It is organized hierarchically and accessed through the use of a network management protocol such as SNMP. It comprises of managed objects and is identified by object identifiers. There are two types of managed objects: scalar and tabular. Scalar objects define a single object instance, and tabular objects define multiple related object instances. Managed objects or MIB objects are comprise of one or more of these object instances. Object instances are essentially variables and are grouped in MIB tables. Object identifiers or object IDs (OID) uniquely identify managed objects in the MIB hierarchy. The MIB hierarchy is structured as a tree with a nameless root, which levels are assigned by different organizations. The top-level object IDs represent different organizations, while the lower-level object IDs are allocated by associated organizations. The diagram below illustrates an MIB tree where the top-level object IDs are different food organizations, and the lower-level object IDs are the associated food. To identify the seed illustrated in the diagram, a unique ID for the object can be fruit.apple.seed or the equivalent numeric object descriptor, 1.3.1. root vegetable (0) fruit (1) fruit-vegetable (2) orange (0) watermelon (1) mango (2) apple (3) skin (0) seed (1) fresh (2) stalk (3) Figure 2. An example of the MIB Tree with Various Hierarchies According to specification by the Structure of Management Information (SMI), a standard MIB should include the following properties: D-Link Australia & NZ Page 3 of 13

- Objects have to be uniquely named - Objects have to be essential for either fault or configuration management - Objects have to be general and must not be too device dependant - Objects have to be maintained in small numbers - No object should be included that can be easily derived from other objects Vendors who wish to include managed objects for their own products can define private branches in the MIB tree. Using private MIBs, specific objects can be defined to include extensive information for a more complete management of devices. Simple Network Management Protocol Version 2 (SNMPv2) SNMP version 2 (SNMPv2) is an evolution of the initial SNMP (SNMPv1). As with SNMPv1, SNMPv2 functions within the specifications of the Structure of Management Information (SMI). SNMPv2 offers a number of improvements to SNMPv1, including additional protocol operations and security and enhanced SMI-specific data types. SNMPv2 allows the definition of bit strings which SNMPv1 do not have. In SNMPv1, SNMP only supports 32-bit network address, but in SNMPv2 it also supports other types of addresses. Unlike SNMPv1 which only supports 32-bit counter size, SNMPv2 supports both 64- bit and 32-bit counters. SNMPv2 uses similar request/response protocol operations as SNMPv1 such as Get, GetNext, and Set. Although both SNMPv1 and SNMPv2 also have Trap operation, they do not use the same message format. The Trap operation of SNMPv2 replaces SNMPv1 Trap. SNMPv2 defines also two new protocol operations: - GetBulk. NMS uses the GetBulk operation to retrieve large blocks of data efficiently. GetBulk can fill a response message with as much requested data as will fit. - Inform. NMS uses the Inform operation to send trap information to another NMS and then receive a response. SNMPv2 is incompatible with SNMPv1. This is because the message formats and protocol operations are different. The two protocol operations, GetBulk and Inform, are not specified or available in SNMPv1 and the header and protocol data unit (PDU) formats are different. D-Link Australia & NZ Page 4 of 13

Simple Network Management Protocol Version 3 (SNMPv3) SNMP version 3 (SNMPv3) is an interoperable standards-based protocol for network management. It provides secure access to devices and combines authentication and encryption packets over the network. SNMPv3 provides the following security features: - Message integrity. It ensures a packet is not tampered during transmission. - Authentication. It determines the message comes from a valid source. - Encryption. The contents of a packet are scrambled so that it can prevent from being seen by any unauthorized source. SNMPv3 supports different security models and security levels. The security model is an authentication strategy in which a user or group resides. The three security models are SNMPv1, SNMPv2c and SNMPv3. A security level is the permitted level of security within a security model. The combination below determines which security mechanism to employ when handling an SNMP packet. Model Level Authentication Encryption v1 noauthnopriv Community String No v2c noauthnopriv Community String No v3 noauthnopriv Username No v3 authnopriv MD5 or SHA No v3 authpriv MD5 or SHA DES For SNMPv1 and SNMPv2c, a community string match is used for authentication. For SNMPv3 with noauthnopriv level, a username match is used for authentication. For SNMPv3 with authnopriv level, authentication based on HMAC-MD5 or HMAC- SHA algorithms may be used. HMAC or Keyed-Hashing for Message Authentication is a mechanism for message authentication using cryptographic hash functions. MD5 and SHA are examples of such hash functions. SNMPv3 also provides DES 56-bit encryption with authentication based on CBC- DES (DES-56) standard. DES refers to Data Encryption Standard and CBC refers to Cipher Block Chaining. CBC is a mode of operation for using DES encryption. D-Link Australia & NZ Page 5 of 13

Introduction to Remote Monitoring (RMON) Remote Monitoring (RMON) is a standard monitoring specification developed by the Internet Engineering Task Force (IETF) in 1992 to support monitoring and protocol analysis. It provides open, comprehensive network fault diagnosis, planning, and performance tuning features for network management. It is designed to collect and process data using remote probe devices. Data collected is used with analysis tools to transform raw data into useful information to help network managers manage their networks and fine tune network performance. RMON is an SNMP standard for a MIB that controls the remote probes or agents. It uses the agent software embedded in network devices to collect network traffic information and device statistics. The information collected is then recorded in a MIB. Network managers can obtain this information by sending queries to the agent s MIB using a polling process. Information obtained from MIB however only record aggregated statistics and does not provide historical analysis of the daily traffic. If network managers want to have a more comprehensive view on the daily traffic, they will have to continually poll the SNMP agents. Continual polling however has two distinct disadvantages. In large networks, polling can generate substantial network traffic and this can cause serious congestion. Polling can also place heavy burden at the network management console as a result of extensive logging and collection of data from many segments. RMON helps network managers determine how to segment networks through identifying, analyzing, monitoring, and troubleshooting problems in the network. Strategic proactive management tasks such as baselining and capacity planning are also easier with RMON agents. RMON saves time and manpower by eliminating the need to travel to a problem site, set up equipment, and begins to collect information. Architecture of RMON RMON is based on client/server architecture. The client is the application running on the network management station that presents RMON information to the user. The server is the monitoring device which uses a software program called a RMON agent or probe to collect information. D-Link Australia & NZ Page 6 of 13

RMON agents are the key element of the monitoring system in the server. Multiple clients can use the agent at the same time. The network managers can configure the agent to offer different views for members of the management team. Clients Servers agent Figure 3. RMON Architecture There are standalone and embedded agents to choose from. The standalone agents are portable and self-contained in a hardware device. RMON agents can be embedded in network devices such as switches, routers and network interface cards. Agents in routers can monitor activities on the LAN interfaces using remote access. Agents in switches can rove all the ports on the switch. Products with embedded agent however may face some degradation in performance when the agent is used actively. Optional network interface card with basic RMON capabilities that can help off-load network devices agent activity to conserve resources is available if required. RMON1 and RMON2 Originally developed for Ethernet and Token Ring LANs, the RMON standard divides monitoring functions into nine groups to support Ethernet topologies and add a tenth group for Token Ring. The RMON standard is created to be deployed as a distributed computing architecture where the agents and probes communicate with a central management station (client) via SNMP. RMON agents have defined SNMP MIB for all nine or ten RMON groups and allows interoperability between different vendors of RMON-based diagnostic tools. D-Link Australia & NZ Page 7 of 13

Root ISO Internet Mgmt MIB Org DoD Private 1. Statistics 2. History 3. Alarms 4. Hosts 5. Hosts TopN MIB 1 MIB 2 RMON 6. Traffic Matrix 7. Filters 8. Capture 9. Events 10. Token Ring Figure 4. RMON Groups The basic RMON standard is broadly accepted by the networking and data communications industry. RMON1 however can only specify monitoring and diagnostics of network traffic at the data link layer and do not monitor end-to-end enterprise-wide and application-layer traffic. RMON1 agent is also unable to identify network hosts and sources beyond the router connection even though it is able to view traffic on the local LAN segment. RMON2 answers the need to analyze traffic and troubleshoot at higher layers. Developed as an extension to RMON1, ROM2 is a complementary technology to RMON1. With RMON2 agents, all RMON groups can now map into major networklayer protocols such as IP, IPX, DECnet, AppleTalk, Banyan VINES to give a complete end-to-end view of the network traffic. D-Link Australia & NZ Page 8 of 13

Application RMON2 Standard Presentation Session Transport Network RMON1 Standard Data Link Physical Figure 5. RMON Standard RMON2 defines the specification for monitoring application-layer traffic. It enables the network managers to monitor network applications such as Telnet, Lotus Notes, Microsoft Mail and others. Using RMON2, the network managers can proactively monitor and troubleshoot any key application-layer traffic in the enterprise network. The RMON groups such as Alarms, Statistics, and History groups may be used for troubleshooting and maintaining network availability based on application-layer traffic. The following table shows how RMON2 can complement existing RMON management solutions to provide different perspectives to address different network management issues. Network Management Issue Relevant OSI Layer Mgt Standard Physical errors & utilization Media Access Control RMON1 LAN segmentation Data Link RMON1 Interconnection of networks Network RMON2 Application usage Application RMON2 D-Link Australia & NZ Page 9 of 13

RMON Groups RMON Ethernet Groups have Ethernet-specific information concerning collisions, runts, and jabbers. The first three groups provide overall monitoring of current activity including detection of possible problems. 1. Statistics Statistics contains information of network activity measured by the probe for each monitored interface. Network managers can collect information on the packet volumes, broadcast and unicast traffic, packet size distributions and errors. 2. History Periodic statistical samples from a network can be stored and retrieved when required using History. With user-definable sampling rates and time intervals, network information can be collected over a period of time to compare behavior, build baselines, and perform accurate trend analysis. 3. Alarm Alarm allows the setting of rising and falling network thresholds and sampling intervals on any counter or integer accessible by any object from the entire SNMP MIB. It periodically takes statistical samples from variables in the probe and compares them with previously configured thresholds. If the monitored variable crosses a threshold, an event is generated. The next three groups help the network manager with traffic analysis and offer more detailed views of segment behavior. 4. Host New hosts are discovered by probe when it sees a new media access control (MAC) address in the segment. Host contains statistics associated with each host discovered. 5. Host TopN HostTopN provides sorted host table statistics and is used to prepare reports describing hosts that top a list ordered by one of the statistics. D-Link Australia & NZ Page 10 of 13

6. Matrix Information about traffic volumes and errors is kept in conversations between sets of two addresses. Matrix stores statistics for conversations. When a new conversation is detected, Matrix creates a new entry in its table. The next three groups allow finer details to be monitored. Network managers use this information to monitor activities such as application behavior or protocol interactions. 7. Filter Filter enables packets to be matched by a filter equation, allowing specific information of the matched packets to form a data stream that may be captured. 8. Capture Capture allows packets to be captured after they flow through a channel and matches filter equation. It defines the number of filtered packets that should be saved and generated as events. 9. Event Event controls the generation and notification of SNMP TRAPs to the remote client. 10. Token Ring RMON2 is for Token Ring which is not covered in this document. The RMON2 MIB extends the capability of the original RMON MIB to include higherlayer protocols for monitoring network and application layer activities. Each group controls a specific RMON2 agent function. The following are additional MIB groups available with RMON2. 11. Protocol Directory Protocol Directory is the list of protocols the probe has the capability of monitoring. It is the means for a RMON2 application to learn which protocol a specific RMON2 probe can see. Protocol Directory is especially useful when the application and probe are from different vendors. D-Link Australia & NZ Page 11 of 13

Root ISO Org DoD Internet Mgmt MIB Private MIB 1 RMON MIB 2 1. Statistics 2. History 3. Alarm 4. Host 5. HostsTopN 6. Matrix 7. Filter 8. Capture 9. Event 10. Token Ring 11. Protocol Directory 12. Protocol Distribution 13. Address Mapping 14. Network-Layer Host 15. Network-Layer Matrix 16. Application-Layer Host 17. Application-Layer Matrix 18. User History Collection 19. Probe Configuration 20. RMON Conformance Figure 6. RMON2 Group 12. Protocol Distribution Protocol Distribution collects traffic statistics such as the number of octets and packets for protocols detected on a network segment to provide distribution and trend information on use of protocols. 13. Address Mapping Address Mapping maps network-layer addresses to MAC-layer addresses for easier viewing by network managers and interpretation of data. D-Link Australia & NZ Page 12 of 13

14. Network-Layer Host Network-Layer Host is the traffic statistics to and from each discovered host. It is useful for improving the configuration and placement of network resources for optimized performance. 15. Network-Layer Matrix Network-Layer Matrix is the traffic statistics on conversations between pairs of discovered network addresses or hosts. 16. Application-Layer Host Application-Layer Host is the traffic statistics to and from each host by protocol, including the application-layer protocols. It provides insight into the use and growth of applications such as Web, Telnet, Lotus Notes, and others. 17. Application-Layer Matrix Application-Layer Matrix is the traffic statistics on conversations between pairs of hosts by protocol, including application-layer protocols. 18. User History Collection User History Collection is the periodic statistical samples of user-specified variables, extending the capabilities beyond RMON1 History group that focuses exclusively on Statistics variables. 19. Probe Configuration Probe Configuration provides a standard way to remotely configure probe parameters such as trap destination and out-of-band management. D-Link Australia & NZ Page 13 of 13