A small introduction to SNMPv3 and how it works with Network Node Manager -i

Size: px
Start display at page:

Download "A small introduction to SNMPv3 and how it works with Network Node Manager -i"

Transcription

1 P a g e 1 Technical white paper SNMPv3 and NNMi A small introduction to SNMPv3 and how it works with Network Node Manager -i May 2015

2 P a g e 2 Contents Contents... 2 SNMPv3 Introduction... 4 SNMPv3 Enhancements... 4 SNMPv3 Goals... 4 Authoritative and Non-authoritative SNMP entities... 4 SNMPv3 Configuration Modes... 5 No Authentication and No Privacy... 5 Authentication with No Privacy... 5 Authentication with Privacy... 6 Authentication and Privacy Protocols... 6 Communication Configuration... 6 User Name... 6 Context Name... 6 Authentication passphrase and protocol... 6 Privacy passphrase /protocol... 7 Configuring a Cisco Router... 7 No Authentication with No Privacy configuration mode... 7 Authentication with No Privacy configuration mode... 8 Authentication with Privacy configuration mode... 8 How to decrypt a SNMPv3 packet in Wireshark... 9 SNMPv3 Objects SNMPv3 Discovery One-stage discovery and two-stage discovery SNMPv3 Communication USM Report Codes that can be observed in a SNMPv3 packet List of Report PDUs SNMPv3 RFCs NNMi Node Discovery, Configuration and Status Poll Discovery and Configuration Poll... 23

3 P a g e 3 Status Poll Troubleshooting Loggers Communication Configuration Packet Capture Problem Examples NNMi and SNMPv3 configuration NNMi SNMP Security Levels NNMi SNMPv3 Settings SNMPv3 supported protocols Configuring NNMi to use SNMPv Example configuration SNMPv3 Traps SNMPv3 Informs For more information... 30

4 P a g e 4 SNMPv3 Introduction SNMP (Simple Network Management) is an internet standard protocol for managing devices on IP networks. It supports both IPv4 and IPv6, and it is mostly used in network management systems (NMS) to monitor network devices. SNMPv3 Enhancements SNMPv3 (SNMP version 3) provides security enhancements (over SNMP v1 and v2c) to the SNMP protocol by adding the following to the SNMP packets that travel through the network Authentication (The use of a passphrase to authenticate with the agent/manager.) Encryption (The use of an encryption protocol to encrypt the payload.) SNMPv3 Goals From the RFC 3414 that describes the SNMPv3 protocol: Provide for verification that each received SNMP message has not been modified during its transmission through the network. Provide for verification of the identity of the user on whose behalf a received SNMP message claims to have been generated. Provide for detection of received SNMP messages, which request or contain management information, whose time of generation was not recent. Provide, when necessary, that the contents of each received SNMP message are protected from disclosure. USM for SNMPv3, RFC This enhances SNMPv1 2c where control was performed by community strings, sent in clear text through the network. The inconvenient is a more complex configuration needed on both sides, the agent and the manager. Authoritative and Non-authoritative SNMP entities The SNMPv3 protocol definition no longer refers to the concepts of agent and manager, instead it refers to SNMP Entities that can be authoritative and non- authoritative. The authoritative entities receive the SNMP requests (get, set, getnext and getbulk ) and the nonauthoritative entity request them. In the NMS context, most of the time the manager is the non-authoritative entity and the agent the authoritative one. For the purposes of this document, we will use the terms manager and nonauthoritative entity interchangeably. This also applies to agent and authoritative entity.

5 P a g e 5 SNMPv3 Configuration Modes The SNMPv3 protocol definition allows for several modes of operation. The following are the different modes that are defined: No Authentication and No Privacy This is the simplest configuration mode and does not have a significant improved security over SNMPv1 2c as there is no authentication and the payload is transferred in plain text over the network. Example. Image 1. SNMPv3 Packet with No Authentication and No Privacy as seen in Wireshark Authentication with No Privacy This mode allows for user authentication between the manager and the agent. The authentication passphrase is passed using a message digest but the packet s payload (data to be transferred) is not encrypted, therefore it can be intercepted easily. Example. Image 2. SNMPv3 Packet with Authentication and No Privacy as seen in Wireshark

6 P a g e 6 Authentication with Privacy This is the most secure mode as it allows for user authentication and an encrypted payload. Example. Image 3. SNMPv3 Packet as seen in Wireshark Authentication and Privacy Protocols The following are the encryption protocols supported. Some SNMPv3 devices may not support all of the protocols Authentication encryption protocols: MD5 and SHA (message digest) Privacy encryption protocols: DES and AES (symmetric key data encryption) Communication Configuration In order to establish a communication with an authoritative SNMP entity, the following parameters need to be known by the non-authoritative SNMP entity. User Name Status: Description: Notes: Mandatory A SNMPv3 user that has access to certain MIBs in the device. SNMPv3 users need to be configured locally in the devices. Context Name Status: Description: Notes: Optional A context is a collection of MIBs that are accessible by a SNMPv3 user. It is optional as it may or may not be configured on the agent side. Authentication passphrase and protocol Status: Optional Description: Passphrase: The passphrase to authenticate against the SNMP agent. Protocol: The protocol used to encrypt the passphrase. Notes: If configured on the agent, then it needs to be specified on the manager.

7 P a g e 7 Privacy passphrase /protocol Status: Optional Description: Passphrase: The passphrase used to encrypt the packet s payload Protocol: The protocol used to encrypt the payload. Notes: If configured on the agent, then it needs to be specified on the manager. Configuring a Cisco Router The following are the configuration examples of SNMPv3 on a Cisco 3640 router. Notes: All commands below will be executed in the Cisco Configure Terminal Mode (configure terminal) Text in blue is the command syntax and/or output Text in orange are the configuration parameters The Cisco 3640 router support the three SNMPv3 modes mentioned earlier # snmp-server group test v3? auth group using the authnopriv Security Level noauth group using the noauthnopriv Security Level priv group using SNMPv3 authpriv security level No Authentication with No Privacy configuration mode Note: This is the simplest configuration mode and does not have a significant improved security over SNMPv1 2c Step 1. Create an SNMP group The SNMP group is used to specify the configuration mode, in this case, NoAuth # snmp-server group TestGroupNoAuth v3 noauth Step 2. Create an SNMP user Create and attach the user to the recently created group (TestGroupNoAuth). # snmp-server user TestUserNoAuth TestGroupNoAuth v3

8 P a g e 8 Step 3. Test the configuration (CLI, from the NNMi Management Server) nnmsnmpwalk.ovpl -v 3 -v3u TestUserNoAuth <device> sysdescr sysdescr.0 : OCTET STRING- (ascii): Cisco Internetwork Operating System Software IOS (tm) 3600 Software (C3640-IK9S-M), Version 12.3(19), RELEASE SOFTWARE (fc2) Technical Support: Copyright (c) by cisco Systems, Inc. Compiled Thu 11-May-06 17: Authentication with No Privacy configuration mode Note: Because the SNMPv3 with authentication and/or privacy configuration uses encrypted data, it is not stored in the normal running config file in the device (because that file is stored as plain text) and therefore the configuration will not be in the output of show running config. Step 1. Create an SNMP group The SNMP group is used to specify the configuration mode, in this case, AuthNoPriv # snmp-server group TestGroupAuth v3 auth Step 2. Create an SNMP user using MD5 as the authentication protocol Create and attach the user to the recently created group (TestGroupAuth). # snmp-server user TestUserAuth TestGroupAuth v3 auth md5 authpass Step 3. Test the configuration (CLI, from the NNMi Management Server) nnmsnmpwalk.ovpl -v 3 -v3u TestUserAuth -A authpass -a MD5 <device> sysdescr sysdescr.0 : OCTET STRING- (ascii): Cisco Internetwork Operating System Software IOS (tm) 3600 Software (C3640-IK9S-M), Version 12.3(19), RELEASE SOFTWARE (fc2) Technical Support: Copyright (c) by cisco Systems, Inc. Compiled Thu 11-May-06 17: Authentication with Privacy configuration mode Note. Because the SNMPv3 with authentication and/or privacy configuration uses encrypted data, it is not stored in the normal running config file in the device (because that file is stored as plain text) and therefore the configuration will not be in the output of show running config

9 P a g e 9 Step 1. Create an SNMP group The SNMP group is used to specify the configuration mode, in this case, AuthPriv # snmp-server group TestGroupPriv v3 priv Step 2. Create an SNMP user using MD5 as the authentication protocol and DES for the privacy protocol The user is attached to the recently created group (TestGroupPriv). # snmp-server user TestUserPriv TestGroupPriv v3 auth md5 authpass priv des privpass Step 3. Test the configuration (CLI, from the NNMi Management Server) nnmsnmpwalk.ovpl -v 3 -v3u TestUserPriv -A authpass -a MD5 -X privpass -x DES <device> sysdescr sysdescr.0 : OCTET STRING- (ascii): Cisco Internetwork Operating System Software IOS (tm) 3600 Software (C3640-IK9S-M), Version 12.3(19), RELEASE SOFTWARE (fc2) Technical Support: Copyright (c) by cisco Systems, Inc. Compiled Thu 11-May-06 17: How to decrypt a SNMPv3 packet in Wireshark When the Privacy configuration mode is in use, Wireshark is unable to decrypt the packets unless it is configured it with the agent s pass-phrases and protocols. To configure Wireshark to decrypt an encrypted v3 packet the following can be done: Steps 1) Edit > Preferences >> 2) Protocols > SNMP 3) Users Table > Edit >> 4) Add New 4.a Engine ID 4.b Username 5) Authentication Model and Password, Privacy Protocol and Password Note: The authentication and privacy protocols can be either obtained from the NNMi configuration or be provided by the network team, but the password must be provided by the network admins as it is encrypted in the database.

10 P a g e 10 Image 4. Steps to decrypt a SNMPv3 packet in Wireshark Result Image 5. SNMPv3 decrypted packet as seen in Wireshark

11 P a g e 11 SNMPv3 Objects The non-authoritative engine needs to learn some values from the authoritative engine so that the communication is allowed. Once that those values are learnt by the manager, then communication (encrypted or plain text) can be initiated. From the RFC 3414 that describes the SNMPv3 protocol: Each SNMP engine maintains three objects: - snmpengineid - snmpengineboots - snmpenginetime Each SNMP engine is always authoritative with respect to these objects in its own SNMP entity. It is the responsibility of a nonauthoritative SNMP engine to synchronize with the authoritative SNMP engine, as appropriate. As mentioned in the RFC, it is the responsibility of the non-authoritative SNMP engine to synchronize with the authoritative SNMP engine. This synchronization process is known as SNMPv3 discovery, described next. SNMPv3 Discovery From the RFC 3414 that describes the SNMPv3 protocol: The User-based Security Model requires that a discovery process obtains sufficient information about other SNMP engines in order to communicate with them. Discovery requires a non-authoritative SNMP engine to learn the authoritative SNMP engine's snmpengineid value before communication may proceed. So, to initiate communication, the non-authoritative entity needs first to learn the authoritative snmpengineid. How does the non-authoritative SNMP engine learns the authoritative snmpengineid required for SNMPv3 communication? From the RFC 3414 that describes the SNMPv3 protocol: This may be accomplished by generating a Request message with a securitylevel of noauthnopriv, a msgusername of zero-length, a msgauthoritativeengineid value of zero length, and the varbindlist left empty. The response to this message will be a Report message containing the snmpengineid of the authoritative SNMP engine as the value of the msgauthoritativeengineid field within the msgsecurityparameters field. It contains a Report PDU with the usmstatsunknownengineids counter in the varbindlist.

12 P a g e 12 The following images are packet captures that demonstrates the steps. Request. A request is sent with no engineid, username, authentication or privacy information and the varbind list left empty. Image 6. SNMPv3 Packet as seen in Wireshark Response. A response is received that includes the Authoritative EngineID and the expected usmstatsunknownengineids report PDU.

13 P a g e 13 Image 7. SNMPv3 Packet as seen in Wireshark Communication. The communication is then established using the newly learned Authoritative EngineID. Image 8. SNMPv3 Packet as seen in Wireshark

14 P a g e 14 It can be observed in the process above that no user authentication was performed (observe the msgauthenticationparameters field). This is because Authentication Protocol and Passphrase was not configured in the Authoritative entity. Note: *** This is not a recommended configuration as it does not introduce any significant improvement over the SNMPv1 or SNMPv2c. For all production systems Authentication Security Level should be used. In the case that the Authentication Security Level is configured in the Authoritative Entity, the RFC 3414 states the following If authenticated communication is required, then the discovery process should also establish time synchronization with the authoritative SNMP engine. To establish Time Synchronization two more values are needed to be learnt from the Authoritative entity: snmpengineboots snmpenginetime The need to learn these values introduce the one-stage or two-stage discovery process. One-stage discovery and two-stage discovery The following is a first response obtained from an Authoritative Entity as part of the discovery process. It can be observed that the Authoritative Entity has provided the engineboots and enginetime values on its first response to the non-authoritative entity as part of the discovery process. At this time the nonauthoritative entity will be able to establish time synchronization and communication will be possible. This process is known as one-stage discovery, as only one packet exchange between the manager and the agent were required for the discovery process.

15 P a g e 15 Response. It includes the engineid and the required values of engineboots and enginetime Image 9. SNMPv3 Packet as seen in Wireshark However, there are occasions where the Authoritative Entity will not provide the engineboots and enginetime values on its first response. The following is an example. Response. Notice that the engineid and the expected usmstatsunknownengineids report PDU are received, but not the engineboots and enginetime. Image 10. SNMPv3 Packet as seen in Wireshark

16 P a g e 16 How does the non-authoritative SNMP engine learns the authoritative engineboots and enginetime required to establish Time Synchronization? From the RFC 3414 that describes the SNMPv3 protocol: This may be accomplished by sending an authenticated Request message with the value of msgauthoritativeengineid set to the newly learned snmpengineid and with the values of msgauthoritativeengineboots and msgauthoritativeenginetime set to zero. For an authenticated Request message, a valid username must be used in the msgusername field. The response to this authenticated message will be a Report message containing the up to date values of the authoritative SNMP engine's snmpengineboots and snmpenginetime as the value of the msgauthoritativeengineboots and msgauthoritativeenginetime fields respectively. It also contains the usmstatsnotintimewindows counter in the varbindlist of the Report PDU. It is required to send a second packet to the Authoritative Entity to obtain the information, hence the name two-stage discovery. The second packet will contain the newly learned engineid, a valid username, and the engineboots and enginetime values set to Zero. And in response, the Authoritative entity will respond with the enginetime, engineboots and the usmstatsnotintimewindows report PDU Example of One-stage Discovery Request Image 11. SNMPv3 get-request packet as seen in Wireshark

17 P a g e 17 Response Image 12. SNMPv3 get-response packet as seen in Wireshark Example of Two-stage discovery Request Image 13. SNMPv3 get-request packet as seen in Wireshark

18 P a g e 18 Response Image 14. SNMPv3 get-response packet as seen in Wireshark Request Image 15. SNMPv3 get-response packet as seen in Wireshark SNMPv3 Communication Once that the non-authoritative entity has learnt the required values to communicate, the communication can start. Depending on the SNMPv3 Configuration Mode (NoAuthNoPriv, AuthNoPriv, AuthPriv), the subsequent packets after the discovery need to be properly encoded for that configuration mode. From the RFC 3411 that describes the SNMPv3 protocol: The msgusername specifies the user (principal) on whose behalf the message is being exchanged. Note that a zero-length username will not match any user, but it can be used for snmpengineid discovery. The msgauthenticationparameters are defined by the authentication protocol in use for the message, as defined by the usmuserauthprotocol column in the user's entry in the usmusertable. The msgprivacyparameters are defined by the privacy protocol in use for the message, as defined by the usmuserprivprotocol column in the user's entry in the usmusertable).

19 P a g e 19 All Configuration Modes The msgusername must be included in packets for all Configuration Modes, except during the Discovery Process. If a Valid user name is not included in the requests then the agent will respond with an usmstatsunknownusernames response PDU and terminate the communication. Including a username does not provide Authentication, as the pass-phrase is the method use to authenticate the user. Providing a username is a protocol requirement that is used to specify the user on whose behalf the message is being exchanged, therefore, the user is required even when no Authentication is configured. Authentication Mode If the User in question has been configured to use Authentication, then the msgauthenticationparameters must include the user s authentication information. If the Authentication parameters are not included then the agent will respond with an usmstatsunsupportedseclevels response PDU. Similarly, if the information is incorrect then the agent will respond with an usmstatswrongdigests response PDU. In both scenarios, the agent terminates the communication. Authentication and Privacy If the User in question has also been configured for Privacy, then the msgprivacyparameters must include the user s Privacy configuration and the packet s Payload must be encrypted. If the privacy Parameters are not included then the agent will respond with an usmstatsunsupportedseclevels response PDU. Similarly, if the information is incorrect then the agent will respond with an usmstatsdecryptionerrors response PDU. In both scenarios, the agent terminates the communication. Communication Examples No Authentication No Privacy Mode Image 16. SNMPv3 get-response packet as seen in Wireshark

20 P a g e 20 Authentication, No Privacy Image 17. SNMPv3 get-response packet as seen in Wireshark Authentication, Privacy Image 18. SNMPv3 get-response packet as seen in Wireshark Important to note about enginetime and engineboots Time synchronization is performed as a mechanism to protect from message replay. During communication, the snmpenginetime value has to be within 150 seconds (when compared with the local notion of snmpenginetime) and if the remote device is rebooted, then the device s snmpengineboots value must be incremented by one, so that the remote entity can interpret that a reboot occurred and therefore the enginetime needs to be updated.

21 P a g e 21 This allows for proper communication between the manager and the agent. This is described in the RFC 3414, Sub-section 3.2 Processing an Incoming SNMP Message. Increasing the snmpengineboots value allows the manager to detect the reboot, and keeping the snmpenginetime value within 150 seconds has been defined in the same RFC as the window of time in which a message generated on behalf of any user is valid Please refer to the RFC 3414 for more details. USM Report Codes that can be observed in a SNMPv3 packet When the authoritative entity detects a problem with a SNMPv3 request, it responds with a Report PDU that contains one of the defined USM report codes defined below. The USM report codes are found within the varbind list of the response packet. If trying to run an nnmsnmpwalk.ovpl against a v3 device then the tool will output the error in humanreadable form. CLI example for an un-existing user: Image 19. CLI Example for a SNMPv3 Response Packet example: Image 23. SNMPv3 packet with a response code as seen in Wireshark List of Report PDUs usmstatsunsupportedseclevels Summary: The SecurityLevel was unknown to the SNMP engine Possible reason: The security level, or configuration mode (noauth, AuthNoPriv, Priv) in use is not configured in the entity.

22 P a g e 22 usmstatsnotintimewindows Summary: Outside of the authoritative SNMP engine's window Possible reason: The enginetime is not the expected value. usmstatsunknownusernames Summary: Packet referenced a user that was not known to the SNMP engine Possible reason: The user does not exist usmstatsunknownengineids Summary: Packet referenced a snmpengineid that was not known to the SNMP engine Possible reason: The engineid is that the expected one. This is normal during v3 discovery. usmstatswrongdigests Summary: Packet didn't contain the expected digest value Possible reason: Digest values are used in the Authentication Protocol. Possibly the Authentication Passphrase is incorrect. usmstatsdecryptionerrors Summary: Packet could not be decrypted Possible reason: Possibly the Privacy Passphrase is incorrect SNMPv3 RFCs The following is a list of SNMPv3 RFC documents that can become useful in the case that interoperability issues occur or that it is desired to expand the knowledge of the protocol. The list of RFCs has been taken from the following source: (SNMP Research International, Inc, 2015) RFC Introduction and Applicability Statements for Internet Standard Management Framework RFC An Architecture for Describing SNMP Management Frameworks RFC Message Processing and Dispatching RFC SNMP Applications RFC User-based Security Model RFC View-based Access Control Model RFC Version 2 of SNMP Protocol Operations RFC Transport Mappings

23 P a g e 23 NNMi Node Discovery, Configuration and Status Poll Discovery and Configuration Poll During initial discovery, re-discovery and configuration poll, NNMi goes through the SNMPv3 discovery process. The information collected during the SNMPv3 discovery process is cached within NNMi memory and used for subsequent status polling. Example of a Configuration Poll for a v3 node that has been already discovered by NNMi: Image 20. SNMPv3 packets as seen in Wireshark during an NNMi Configuration Poll Status Poll During on demand or scheduled status poll, NNMi uses the cached SNMPv3 parameters for communication. Example of a Status Poll for a v3 node that has been already discovered by NNMi: Image 21. SNMPv3 packets as seen in Wireshark during an NNMi Status Poll

24 P a g e 24 Troubleshooting Loggers Use the loggers with caution since they may create a massive amount of data in an environment with thousands of nodes being monitored nnmsetlogginglevel.ovpl com.hp.ov.snmp nnmsetlogginglevel.ovpl com.hp.ov.nms.comm nnmsetlogginglevel.ovpl com.hp.ov.nms.snmp Communication Configuration Use the Actions > Configuration Details > Communication Configuration UI menu or the following command to retrieve the communication settings for the node in question Example: nnmcommconf.ovpl -proto snmp -host <device> [root@server ~]# nnmcommconf.ovpl -proto snmp -host <device> SNMP Configuration Entry: name = <device> management address = <IP> addressforced = true preferredversion = null minimum security level = Authentication, Privacy readcommunity = null writecommunity = null timeout = 5000 retries = 2 port = 161 proxyport = null proxyaddress = null SNMPv3 user names = TestUserPriv SNMPv3 context names = enabled = true address disco enabled = false get bulk enabled = true region name = null node setting description = null active address = active readcommunity = null active SNMPv3 user = TestUserPriv active SNMPv3 context = null

25 P a g e 25 Packet Capture Use Wireshark on Windows, snoop on Solaris, nettl on HPUX or tcpdump on Linux to capture the communication. Then use Wireshark to decode the packets (if encrypted) as shown earlier on this document. Problem Examples usmstatsunsupportedseclevels - Configuration Poll 1) NNMi does send the discovery packet 2) The device does respond with the usual usmstatsunknownengineids report ( ) 3) NNMi then sends a get request with the username, engine ID but it sends it in plain text, it does not use the authentication/privacy configuration 4) The agent responds with usmstatsunsupportedseclevels ) The node discovery ends here and it is discovered as non-snmp. Possible Reason: NNMi is not configured with the correct privacy/authentication mode. Solution: Configure NNMi properly usmstatsnotintimewindows - Status Poll 1) The device is already discovered therefore NNMi sends a request packet with the known v3 parameters. 2) The agent responds with usmstatsnotintimewindows ) The status poll fails Possible Reason: The agent restarted, it did not update the enginebootcount and the enginetime known by NNMi is incorrect. Solution: Run a configuration poll against the device

26 P a g e 26 NNMi and SNMPv3 configuration NNMi SNMP Security Levels NNMi supports several security levels for SNMP communication. A security level is a combination of allowed SNMP versions that can be tried to communicate with an agent. The detailed description of the available security levels are documented in the NNMi Deployment Reference, page 49, section SNMP Version Preferences. The following are the available security levels and a brief description: Community Only (SNMPv1 only) Community Only (SNMPv1 or v2c) Community No Authentication, No Privacy Authentication, No Privacy Authentication, Privacy NNMi will only use SNMPv1 to communicate with a device NNMi will try SNMPv2 first and if no response, NNMi will try SNMPv1 to communicate with a device NNMi attempts SNMPv2 communication first, if no response, it tries with SNMPv1 and if no response, it finally tries SNMPv3. NNMi attempts to use SNMPv3 only, with the noauthnopriv mode. NNMi attempts to use SNMPv3 only, with the AuthNoPriv mode. NNMi attempts to use SNMPv3 only, with the AuthPriv mode. Security levels can be configured at the Communication Settings > Default and Regional levels only. For the Communication > Specific Node Settings, the user must choose one explicit protocol to communicate. NNMi SNMPv3 Settings An NNMi SNMPv3 Settings is a table entry that contains the following information. Unique Name User Name Context Name Authentication Protocol Passphrase Privacy Protocol Passphrase Internal record name to refer to the configuration. Not used by the SNMPv3 protocol during communication. SNMPv3 User Name SNMPv3 Context (if needed) SNMPv3 Authentication Protocol SNMPv3 Authentication Passphrase SNMPv3 Privacy Protocol SNMPv3 Privacy Passphrase Image 23. NNMi SNMPv3 Settings form Every SNMPv3 Settings entry can be used at any Communication Configuration level (Default, Region, and Specific Node Settings).

27 P a g e 27 SNMPv3 supported protocols The following are the SNMPv3 supported protocols in NNMi For SNMPv3 authentication: HMAC-MD5-96 HMAC-SHA-1 For SNMPv3 privacy: DES-CBC TripleDES AES-128 AES-192 AES-256 Configuring NNMi to use SNMPv3 The configuration can be done at the Default, Regional or Specific Node Settings level in the NNMi Communication Configuration works-space. Image 24. NNMi Communication Configuration works-space If using the Default or Region configuration levels, then the SNMP Minimum Security Level needs to be set to Community or one of the SNMPv3 Specific Security Levels (Authentication, Privacy and their combinations).

28 P a g e 28 If Community is chosen, and a valid SNMP Community String is also configured at the level, then NNMi will succeed to communicate using SNMPv2c or SNMPv1 before it attempts to use SNMPv3, therefore SNMPv3 will not be used. In that case, if you need NNMi to use SNMPv3 you can try one of the following possible solutions: Configure the agent to only support SNMPv3 (do not respond to the community string) Configure NNMi to use a SNMPv3 Specific Security Level (at a Regional or Specific Level) Example configuration The image below shows an example configuration in the Regional Communication Configuration. The SNMP Minimum Security Level has been set to the SNMPv3 Specific Level Authentication, Privacy and a new SNMPv3 Settings entry has been added testsnmpv3setting. Under this configuration, for every node contained in this region, NNMi will try to communicate specifically with SNMPv3 using the parameters in the testsnmpv3setting configuration. Image 25. NNMi Communication Configuration for Region SNMPv3 Traps The following has been taken from the NNMi Deployment Reference

29 P a g e 29 When NNMi uses SNMPv3 to communicate with a device, it uses a discovery process to identify the Engine ID, boot count, and engine time of the device. NNMi then uses this information, along with the configured user and protocol details, to start sending messages to the device. When the device sends a trap to NNMi, the device may not have the NNMi information, and because a trap is a singlepacket transaction, it has no way to get the necessary information. Therefore, it uses its own Engine ID, boot count and engine time in the trap, along with the user name and protocol details. These device details must be the same as those configured for the device in NNMi. You cannot configure multiple SNMPv3 users per device in NNMi. NNMi Deployment Reference, page 50, SNMPv3 Traps and Informs A SNMP trap is an unsolicited message sent from the managed node to the management server, it is a single transaction and because of that it does not try to perform a SNMPv3 information discovery to obtain the management server s Engine ID, Boot Count or engine time. As a result, when sending a SNMPv3 trap, the device uses its own values. For NNMi to be able to process a SNMPv3 trap, the node sending the trap needs to have been discovered by NNMi as a SNMPv3 device, this way, NNMi will have cached the device s Engine Time, Engine ID and Boot Count and NNMi will also know the managed node s user and protocol configuration. NNMi will use this information to process the incoming trap. Without the information NNMi will be unable to process the trap. The User and Protocol configuration information in the trap must match what has been configured in NNMi for the device, otherwise NNMi will be unable to process the trap (i.e won t be able to decrypt the information). SNMPv3 Informs The following has been taken from the NNMi Deployment Reference An inform is an acknowledged packet, so this is more like an SNMP request that NNMi would make to the device except, this time, it is the device initiating the first packet and NNMi responding with the acknowledgment. The device, therefore, performs the discovery to NNMi to learn NNMi s Engine ID, boot count and engine time. The user name and protocol configuration that the device uses must match what is configured in the NNMi trap forwarding configuration this is, in effect, NNMi s SNMPv3 agent configuration NNMi Deployment Reference, page 50, SNMPv3 Traps and Informs

30 P a g e 30 The SNMPv3 Inform, as opposed to a trap, does perform a SNMP discovery. The process will be similar to the one described on this document under the SNMPv3 Discovery section. On this scenario, the device is initiating the connection and it will be responsible to perform the SNMPv3 information discovery (Engine Time, Engine ID, Boot Count). To be able to communicate with NNMi, the managed device will have to know the NNMi User and Configuration Protocols. Just like NNMi needs to know the same information when initiating communication with a managed v3 device. The device needs to be configured to use the NNMi s user and protocol information. The NNMi user and protocol information can be found by accessing the following configuration page in the NNMI Web Console: Configuration > Incidents > Trap Server > Trap Forwarding Configuration By default, the username is NNMi and the protocol information is not configured as seen below Image 26. NNMi Trao Forwarding Configuration page After defining the Authentication and Privacy settings in NNMI, configure the remote device sending the SNMPv3 informs to use these settings as well. For more information For more information about configuring NNMi to work with SNMPv3, please refer to the NNMi Deployment Reference for your NNMi version.

Structure of Management Information

Structure of Management Information Structure of Management Information Structure of Management Information' (SMI) defines the general framework within which MIBs can be defined and constructed (STD58) SMI identifies data types usable in

More information

January User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)

January User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) Network Working Group Request for Comments: 2274 Obsoletes: 2264 Category: Standards Track U. Blumenthal IBM T. J. Watson Research B. Wijnen IBM T. J. Watson Research January 1998 Status of this Memo User-based

More information

Configuring SNMP. Information About SNMP. SNMP Functional Overview. This chapter contains the following sections:

Configuring SNMP. Information About SNMP. SNMP Functional Overview. This chapter contains the following sections: This chapter contains the following sections: Information About SNMP, page 1 Licensing Requirements for SNMP, page 5 Guidelines and Limitations for SNMP, page 5 Default SNMP Settings, page 6, page 6 Disabling

More information

SNMPv3 Secure, Safe and Still Simple

SNMPv3 Secure, Safe and Still Simple Dr. Schwartzkopff IT Services SNMPv3 Secure, Safe and Still Simple Dr. Michael Schwartzkopff SNMP Seite 1/19 Why SNMPv3? Several attemps for a SNMPv2 solved different problems. SNMPv3 offers a general

More information

Configuring SNMP. Send documentation comments to CHAPTER

Configuring SNMP. Send documentation comments to CHAPTER 27 CHAPTER The CLI and SNMP use common roles in all switches in the Cisco MDS 9000 Family. You can use SNMP to modify a role that was created using CLI and vice versa. Users, passwords, and roles for all

More information

For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Configuration Fundamentals Command Reference

For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Configuration Fundamentals Command Reference CHAPTER 51 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 4500 series switch. Note For complete syntax and usage information for the commands used

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER CHAPTER 28 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 2960 switch. For complete syntax and usage information for the commands used in this chapter,

More information

SNMPv3 Community MIB Support

SNMPv3 Community MIB Support The SNMP Version 3 Community MIB Support feature provides support for the Simple Network Management Protocol Version 3 (SNMPv3) Community MIB (SNMP-COMMUNITY-MIB) module defined in RFC 2576, Coexistence

More information

This chapter will describe the architecture that the

This chapter will describe the architecture that the C H A P T E R 4 SNMPv3 Framework This chapter will describe the architecture that the SNMPv3 Framework is defined under. It will also show new textual conventions that have been defined for SNMPv3, along

More information

Configuring SNMP. About SNMP. SNMP Functional Overview

Configuring SNMP. About SNMP. SNMP Functional Overview This chapter describes how to configure the SNMP feature on Cisco NX-OS devices. This chapter contains the following sections: About SNMP, page 1 Licensing Requirements for SNMP, page 7 Guidelines and

More information

Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series.

Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. Understand SNMP, page 1 Basic SNMP Components, page 2 SNMPv3 Support, page 3 SNMP Traps, page 4

More information

Manage Your Device Inventory

Manage Your Device Inventory About Device Inventory, page 1 Device Inventory and Cisco ISE Authentication, page 7 Device Inventory Tasks, page 7 Add a Device Manually, page 8 Filter Devices, page 12 Change Devices Layout View, page

More information

Configure Site Network Settings

Configure Site Network Settings About Global Network Settings, page 1 About Device Credentials, page 2 Configure Global Device Credentials, page 4 Configure IP Address Pools, page 9 Configure Global Network Servers, page 9 Configure

More information

DELL EMC OPENMANAGE ESSENTIALS (OME) SNMPV3 SUPPORT

DELL EMC OPENMANAGE ESSENTIALS (OME) SNMPV3 SUPPORT DELL EMC OPENMANAGE ESSENTIALS (OME) SNMPV3 SUPPORT SNMPv3 based Discovery/Inventory/Event ABSTRACT This technical white paper explains how to make use of the SNMPv3 protocol for discovery or inventory

More information

Manage Your Inventory

Manage Your Inventory About Inventory About Inventory, on page 1 Inventory and Cisco ISE Authentication, on page 6 Add a Device Manually, on page 7 Integrate Meraki Dashboard, on page 10 Filter Devices, on page 11 Change Devices

More information

Configuring Simple Network Management Protocol

Configuring Simple Network Management Protocol Configuring Simple Network Management Protocol Finding Feature Information, page 1 Prerequisites for SNMP, page 1 Restrictions for SNMP, page 3 Information About SNMP, page 4 How to Configure SNMP, page

More information

SNMP Simple Network Management Protocol

SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP:

More information

Discover Your Network

Discover Your Network About Discovery, on page 1 Discovery Prerequisites, on page 2 Discovery Credentials, on page 2 Preferred Management IP Address, on page 4 Discovery Configuration Guidelines and Limitations, on page 5 Perform

More information

Lab 6: SNMPv3 Security NET311 - Computer Network Management

Lab 6: SNMPv3 Security NET311 - Computer Network Management Lab 6: SNMPv3 Security NET311 - Computer Network Management Instructor: Dr. Mostafa Dahshan Objectives 1. Understanding security features in SNMPv3. 2. Configuring views, groups and users on Cisco routers.

More information

Manage Your Inventory

Manage Your Inventory About Inventory About Inventory, on page 1 Inventory and Cisco ISE Authentication, on page 2 Display Information About Your Inventory, on page 2 Types of Devices in the DNA Center Inventory, on page 6

More information

Configuring the Cisco APIC-EM Settings

Configuring the Cisco APIC-EM Settings Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page

More information

SNMP. Simple Network Management Protocol Philippines Network Operators Group, March Jonathan Brewer Telco2 Limited New Zealand

SNMP. Simple Network Management Protocol Philippines Network Operators Group, March Jonathan Brewer Telco2 Limited New Zealand SNMP Simple Network Management Protocol Philippines Network Operators Group, March 2018 Jonathan Brewer Telco2 Limited New Zealand Objectives Participants will understand the basics of: SNMP Architecture

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER CHAPTER 30 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Cisco ME 3400E Ethernet Access switch. Note For complete syntax and usage information for the commands

More information

Restrictions for SNMP use on Cisco IOS XR Software

Restrictions for SNMP use on Cisco IOS XR Software Simple Network Management Protocol (SNMP) is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and

More information

SNMP Configuration Guide

SNMP Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 2017 Cisco Systems, Inc. All rights

More information

Configuring SNMP. Finding Feature Information. Prerequisites for SNMP

Configuring SNMP. Finding Feature Information. Prerequisites for SNMP Finding Feature Information, on page 1 Prerequisites for SNMP, on page 1 Restrictions for SNMP, on page 3 Information About SNMP, on page 4 How to Configure SNMP, on page 9 Monitoring SNMP Status, on page

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 24 CHAPTER This chapter describes how to configure the the ML1000-2, ML100T-12, ML100X-8, and ML-MR-10 cards for operating with Simple Network Management Protocol (SNMP). Note For complete syntax and usage

More information

Table of Contents. 2 MIB Configuration Commands 2-1 MIB Configuration Commands 2-1 display mib-style 2-1 mib-style 2-1

Table of Contents. 2 MIB Configuration Commands 2-1 MIB Configuration Commands 2-1 display mib-style 2-1 mib-style 2-1 Table of Contents 1 SNMP Configuration Commands 1-1 SNMP Configuration Commands 1-1 display snmp-agent community 1-1 display snmp-agent group 1-2 display snmp-agent local-engineid 1-3 display snmp-agent

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 22 CHAPTER Configuring SNMP This chapter describes how to configure the ML-Series card for operating with Simple Network Management Protocol (SNMP). Note For complete syntax and usage information for the

More information

Table of Contents. 2 MIB Configuration Commands 2-1 display mib-style 2-1 mib-style 2-1

Table of Contents. 2 MIB Configuration Commands 2-1 display mib-style 2-1 mib-style 2-1 Table of Contents 1 SNMP Configuration Commands 1-1 SNMP Configuration Commands 1-1 display snmp-agent community 1-1 display snmp-agent group 1-2 display snmp-agent local-engineid 1-3 display snmp-agent

More information

Table of Contents. 2 MIB Style Configuration 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1

Table of Contents. 2 MIB Style Configuration 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1 Table of Contents 1 SNMP Configuration 1-1 SNMP Overview 1-1 SNMP Mechanism 1-1 SNMP Protocol Version 1-2 MIB Overview 1-2 SNMP Configuration 1-3 Configuring SNMP Logging 1-5 Introduction to SNMP Logging

More information

SNMP Support on NFVIS

SNMP Support on NFVIS Introduction about SNMP, page 1 SNMP Operations, page 1 SNMP Versions, page 3 Configuring SNMP Support, page 3 Introduction about SNMP Simple Network Management Protocol (SNMP) is an application-layer

More information

Prerequisites for AES and 3-DES Encryption Support for SNMP. Version 3. Finding Feature Information

Prerequisites for AES and 3-DES Encryption Support for SNMP. Version 3. Finding Feature Information AES and 3-DES Encryption Support for SNMP Version 3 The AES and 3-DES Encryption Support for SNMP Version 3 feature enhances the encryption capabilities of Simple Network Management Protocol (SNMP) Version

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

Command Manual SNMP-RMON. Table of Contents

Command Manual SNMP-RMON. Table of Contents Table of Contents Table of Contents... 1-1 1.1 SNMP Configuration Commands... 1-1 1.1.1 display snmp-agent... 1-1 1.1.2 display snmp-agent community... 1-2 1.1.3 display snmp-agent group... 1-3 1.1.4 display

More information

SNMP.CONF(5) Net-SNMP SNMP.CONF(5)

SNMP.CONF(5) Net-SNMP SNMP.CONF(5) NAME snmp.conf - configuration files for the Net-SNMP applications DESCRIPTION Applications built using the Net-SNMP libraries typically use one or more configuration files to control various aspects of

More information

Table of Contents. 2 MIB Style Configuration 2-1 Overview 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1

Table of Contents. 2 MIB Style Configuration 2-1 Overview 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1 Table of Contents 1 SNMP Configuration 1-1 SNMP Overview 1-1 SNMP Mechanism 1-1 SNMP Protocol Versions 1-2 MIB Overview 1-2 Configuring SNMP 1-3 Configuring SNMPv3 1-3 Configuring SNMPv1 and SNMPv2c 1-4

More information

Outline. SNMP Simple Network Management Protocol. Before we start on SNMP. Simple Network Management Protocol

Outline. SNMP Simple Network Management Protocol. Before we start on SNMP. Simple Network Management Protocol Outline SNMP Simple Network Management Protocol Several slides are courtesy of the Addison Wesley companion web site for textbook by Liebeherr and El Zarki and others added by M. Veeraraghavan, Univ. of

More information

Table of Contents 1 SNMP Configuration Commands RMON Configuration Commands 2-1

Table of Contents 1 SNMP Configuration Commands RMON Configuration Commands 2-1 Table of Contents 1 SNMP Configuration Commands 1-1 SNMP Configuration Commands 1-1 display snmp-agent 1-1 display snmp-agent community 1-1 display snmp-agent group 1-3 display snmp-agent mib-view 1-4

More information

Network Management (NETW-1001)

Network Management (NETW-1001) Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2017 TOC 1 SNMPv2 and SNMPv3 SNMPv2 More Operations SNMPv1 defines the GET, GETNEXT, SET, GETRESPONSE, and TRAP PDUs.

More information

SNMP Commands CHAPTER

SNMP Commands CHAPTER CHAPTER 7 This chapter contains the Cisco ONS 15540 ESP-specific SNMP commands. For the complete list of SNMP commands supported on the Cisco ONS 15540 ESP, and their descriptions, refer to Cisco IOS Configuration

More information

Defining IPsec Networks and Customers

Defining IPsec Networks and Customers CHAPTER 4 Defining the IPsec Network Elements In this product, a VPN network is a unique group of targets; a target can be a member of only one network. Thus, a VPN network allows a provider to partition

More information

Table of Contents. Section 4A: SNMPv1 and SNMPv2c configuration... 9 Section 4B: SNMPv3 configuration... 10

Table of Contents. Section 4A: SNMPv1 and SNMPv2c configuration... 9 Section 4B: SNMPv3 configuration... 10 Technical Note: SecureSync Monitoring- SNMP/Email alert operation of the Spectracom SecureSync Purpose: The purpose of this document is to provide supplemental information regarding monitoring (SNMP and

More information

Category: Standards Track Andiamo Systems, Inc. K. McCloghrie Cisco Systems, Inc. June 2004

Category: Standards Track Andiamo Systems, Inc. K. McCloghrie Cisco Systems, Inc. June 2004 Network Working Group Request for Comments: 3826 Category: Standards Track U. Blumenthal Lucent Technologies F. Maino Andiamo Systems, Inc. K. McCloghrie Cisco Systems, Inc. June 2004 The Advanced Encryption

More information

SNMP Support on NFVIS

SNMP Support on NFVIS Introduction about SNMP, page 1 SNMP Operations, page 1 SNMP Versions, page 3 SNMP MIB Support, page 4 Configuring SNMP Support, page 6 Introduction about SNMP Simple Network Management Protocol (SNMP)

More information

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies: Using Discovery Using Discovery Open the Discovery application by clicking Discovery in the Task Bar, selecting Discovery from the Applications menu, or by clicking the Discovery icon in the Topology Toolbar.

More information

Configuring SNMP. Information about SNMP CHAPTER

Configuring SNMP. Information about SNMP CHAPTER CHAPTER 74 This chapter describes how to configure SNMP to monitor the adaptive security appliance and includes the following sections: Information about SNMP, page 74-1 Licensing Requirements for SNMP,

More information

This chapter describes how to configure Simple Network Management Protocol (SNMP) to monitor the Cisco ASA.

This chapter describes how to configure Simple Network Management Protocol (SNMP) to monitor the Cisco ASA. This chapter describes how to configure Simple Network Management Protocol () to monitor the Cisco ASA. About, page 1 Guidelines for, page 4 Configure, page 6 Monitoring, page 10 History for, page 11 About

More information

Technical Document. Technical Document. Configuring Castlerock SNMPc for SNMPv3 communications with NuDesign SNMPv3 Agent Service

Technical Document. Technical Document. Configuring Castlerock SNMPc for SNMPv3 communications with NuDesign SNMPv3 Agent Service Technical Document Configuring Castlerock SNMPc for SNMPv3 communications with NuDesign SNMPv3 Agent Service NuDesign Technologies, Inc. Rev A03 1 www.ndt-inc.com / www.snmp4windows.com Table of Contents

More information

Unit 2. Internet based Network Management

Unit 2. Internet based Network Management Unit 2 Internet based Network Management Internet based Network Management In the Internet world Network management refers to management of networks, devices, and hosts Achieved through 'Simple Network

More information

Implementing IPv6 for Network Management

Implementing IPv6 for Network Management Implementing IPv6 for Network Management Last Updated: August 1, 2012 This document describes the concepts and commands used to manage Cisco applications over IPv6 and to implement IPv6 for network management.

More information

Implementing IPv6 for Network Management

Implementing IPv6 for Network Management Implementing IPv6 for Network Management Last Updated: July 31, 2012 This document describes the concepts and commands used to manage Cisco applications over IPv6 and to implement IPv6 for network management.

More information

Configuring Security Features on an External AAA Server

Configuring Security Features on an External AAA Server CHAPTER 3 Configuring Security Features on an External AAA Server The authentication, authorization, and accounting (AAA) feature verifies the identity of, grants access to, and tracks the actions of users

More information

Configuring SNMP. Information About SNMP CHAPTER

Configuring SNMP. Information About SNMP CHAPTER CHAPTER 8 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter describes how to configure Simple Network Management Protocol (SNMP)

More information

SNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics

SNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics Simple Network Management Protocol Support, page 1 SNMP Basics, page 1 SNMP Management Information Base (MIB), page 2 Set Up SNMP, page 3 Import Previously Configured Windows SNMP v1 Community Strings,

More information

Chapter 3 Managing System Settings

Chapter 3 Managing System Settings Chapter 3 Managing System Settings Using the System Settings Utility The navigation pane at the top of the web browser interface contains a System tab that enables you to manage your FS700TSSmart Switch

More information

SNMP Driver Help Kepware Technologies

SNMP Driver Help Kepware Technologies 2014 Kepware Technologies 2 Table of Contents Table of Contents 2 6 Overview 6 Channel Setup 7 Device Setup 9 Device ID Selection 9 Scan Mode 10 Communication Parameters 11 SNMP v3 Security 13 MIB Import

More information

User authentication configuration example 11 Command authorization configuration example 13 Command accounting configuration example 14

User authentication configuration example 11 Command authorization configuration example 13 Command accounting configuration example 14 Contents Logging in to the CLI 1 Login methods 1 Logging in through the console or AUX port 2 Logging in through Telnet 5 Telnetting to the switch 5 Telnetting from the switch to another device 7 Logging

More information

The Security feature available on the ME 1200 Web GUI allows you to set the security configurations for

The Security feature available on the ME 1200 Web GUI allows you to set the security configurations for The Security feature available on the ME 1200 Web GUI allows you to set the security configurations for the ME 1200. Switch, page 1 Network, page 16 Switch Users Configuration This option provides an overview

More information

Implementing IPv6 for Network Management

Implementing IPv6 for Network Management Implementing IPv6 for Network Management Last Updated: December 1, 2011 This document describes the concepts and commands used to manage Cisco applications over IPv6 and to implement IPv6 for network management.

More information

Configuring RADIUS and TACACS+

Configuring RADIUS and TACACS+ 28 CHAPTER The authentication, authorization, and accounting (AAA) mechanism verifies the identity of, grants access to, and tracks the actions of users managing a switch. All Cisco MDS 9000 Family switches

More information

SNMP Driver PTC Inc. All Rights Reserved.

SNMP Driver PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents SNMP Driver 1 Table of Contents 2 SNMP Driver 6 Overview 6 Channel Setup 7 Channel Properties General 7 Channel Properties Ethernet Communications

More information

Integration Guide. Auvik

Integration Guide. Auvik Integration Guide Auvik Revised: 27 February 2017 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration. Guide Details

More information

SNMP Driver Help Kepware Technologies

SNMP Driver Help Kepware Technologies 2012 Kepware Technologies 2 Table of Contents Table of Contents 2 5 Overview 5 Channel Setup 6 Device Setup 8 Device ID Selection 8 Scan Mode 9 Communication Parameters 10 SNMP v3 Security 12 MIB Import

More information

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER 22 CHAPTER This chapter describes how to configure the Simple Network Management Protocol (SNMP) on the Catalyst 3750 switch. Unless otherwise noted, the term switch refers to a standalone switch and a

More information

Platform Settings for Classic Devices

Platform Settings for Classic Devices The following topics explain Firepower platform settings and how to configure them on Classic devices: Introduction to Firepower Platform Settings, page 1 Configuring Firepower Platform Settings, page

More information

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24 Contents Logging in to the CLI 1 Login methods 1 Logging in through the console or AUX port 2 Introduction 2 Configuration procedure 2 Logging in through Telnet 6 Introduction 6 Logging in to the switch

More information

Security Avaya Ethernet Routing Switch 8800/8600

Security Avaya Ethernet Routing Switch 8800/8600 Security Avaya Ethernet Routing Switch 8800/8600 7.1.3 NN46205-601, 06.03 August 2012 2012 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information

More information

2V] Chapter 2 Catalyst 3560 Switch Cisco IOS Commands shutdown. This command has no arguments or keywords.

2V] Chapter 2 Catalyst 3560 Switch Cisco IOS Commands shutdown. This command has no arguments or keywords. 2V] Chapter 2 Catalyst 3560 Switch Cisco IOS Commands shutdown shutdown Use the shutdown interface configuration command to disable an interface. Use the no form of this command to restart a disabled interface.

More information

DGS Layer 2 Switch. Command Line Interface Reference Manual 6DGS3024C.04 RECYCLABLE. Fourth Edition (August 2006)

DGS Layer 2 Switch. Command Line Interface Reference Manual 6DGS3024C.04 RECYCLABLE. Fourth Edition (August 2006) DGS-3024 Layer 2 Switch Command Line Interface Reference Manual Fourth Edition (August 2006) 6DGS3024C.04 RECYCLABLE Table of Contents Introduction... 1 Using the Console CLI... 3 Command... 7 Basic Switch

More information

AlliedView -EMS DEVICE MANAGER USER S GUIDE

AlliedView -EMS DEVICE MANAGER USER S GUIDE AlliedView -EMS 4.0.1 DEVICE MANAGER USER S GUIDE AlliedView -EMS 4.0.1 DEVICE MANAGER USER S GUIDE Page 1 of 125 TABLE OF CONTENTS 1 OVERVIEW...6 2 STARTING DEVICE MANAGER...7 2.1 STARTING FROM THE COMMAND

More information

SNMP Driver Help Kepware Technologies

SNMP Driver Help Kepware Technologies 2011 Kepware Technologies 2 Table of Contents Table of Contents 2 5 Overview 5 Channel Setup 6 Device Setup 7 Device ID Selection 7 Communication Parameters 8 SNMP v3 Security 11 MIB Import Settings 13

More information

DES-3010F / DES-3010G / DES-3018 / DES-3026

DES-3010F / DES-3010G / DES-3018 / DES-3026 DES-3010F / DES-3010G / DES-3018 / DES-3026 Managed 8/16/24-port 10/100Mbps N-Way Fast Ethernet Switch Command Line Interface Reference Manual First Edition (May 2005) 651ES3026015 Printed In Taiwan RECYCLABLE

More information

SNMP CEF-MIB Support

SNMP CEF-MIB Support SNMP CEF-MIB Support Last Updated: October 5, 2011 The Cisco Express Forwarding--SNMP CEF-MIB Support feature introduces the CISCO-CEF-MIB, which allows management applications through the use of the Simple

More information

Monitoring. Ping CHAPTER

Monitoring. Ping CHAPTER CHAPTER 10 This chapter explains the monitoring activity. It contains the following sections: Ping, page 10-1 SLA, page 10-3 Task Manager, page 10-23 Reports, page 10-27 Ping Ping is the way Prime Provisioning

More information

SilverCreek Compare Versions

SilverCreek Compare Versions Platform Support: Windows Linux Includes all the platfoms listed above T T T x x x x x x Test Coverage: Tests for SNMPv1, v2c, all private and standard MIBs Tests for SNMPv1, v2c, v3, all private and standard

More information

CounterACT Wireless Plugin

CounterACT Wireless Plugin CounterACT Wireless Plugin Version 1.7.0 Table of Contents About the Wireless Plugin... 4 Wireless Network Access Device Terminology... 5 How It Works... 6 About WLAN Controller/Lightweight Access Points...

More information

Avaya Integrated Management Release 5.2 Secure Access Administration

Avaya Integrated Management Release 5.2 Secure Access Administration Avaya Integrated Management Release 5.2 Secure Access Administration Issue 1 May 2009 2009 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this

More information

0] Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commands shutdown. This command has no arguments or keywords.

0] Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commands shutdown. This command has no arguments or keywords. 0] Chapter 2 shutdown shutdown Use the shutdown interface configuration command to disable an interface. Use the no form of this command to restart a disabled interface. shutdown no shutdown Syntax Description

More information

MIB Browser Version 10 User Guide

MIB Browser Version 10 User Guide MIB Browser Version 10 User Guide The ireasoning MIB browser is a powerful and easy-to-use tool powered by ireasoning SNMP API. MIB browser is an indispensable tool for engineers to manage SNMP enabled

More information

Configuring SNMP CHAPTER. This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point.

Configuring SNMP CHAPTER. This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point. CHAPTER 18 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point. Note For complete syntax and usage information for the commands used in this chapter,

More information

Table of Contents Chapter 1 SNMP Configuration Commands

Table of Contents Chapter 1 SNMP Configuration Commands Table of Contents Table of Contents... 1-1 1.1 SNMP Configuration Commands... 1-1 1.1.1 display snmp-agent local-engineid... 1-1 1.1.2 display snmp-agent community... 1-1 1.1.3 display snmp-agent group...

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

Add and Organize Devices

Add and Organize Devices This chapter contains the following topics: Add Devices to Prime Infrastructure, on page 1 Import Devices from Another Source, on page 7 Create Device Import CSV Files, on page 7 Add Devices Manually (New

More information

DES Layer 2 Switch Command Line Interface Reference Manual Release ES RECYCLABLE. May 2005

DES Layer 2 Switch Command Line Interface Reference Manual Release ES RECYCLABLE. May 2005 DES-3550 Layer 2 Switch Command Line Interface Reference Manual Release 3.5 May 2005 651ES3550055 RECYCLABLE Table of Contents Introduction... 1 Using the Console CLI... 4 Command... 8 Basic Switch Commands...

More information

SilverCreek The World s Best-Selling SNMP Test Suite

SilverCreek The World s Best-Selling SNMP Test Suite SilverCreek The World s Best-Selling SNMP Test Suite What s Inside... SilverCreek SNMP Tests Test Coverage A Rich Toolset Extend, Customize, Diagnose, Analyze Testing options/customizations Creating Your

More information

SilverCreek SNMP Test Suite

SilverCreek SNMP Test Suite SilverCreek SNMP Test Suite What's Inside: Executive Overview... 2 SilverCreek SNMP Tests... 2 Test Coverage:... 2 A Rich Toolset... 3 MIB Tools... 3 Traps, Alerts, Informs... 3 Utilities... 3 Diagnostic

More information

Network Management & Monitoring Introduction to SNMP

Network Management & Monitoring Introduction to SNMP Network Management & Monitoring Introduction to SNMP These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

Ethernet Switch ZyNOS 4.0

Ethernet Switch ZyNOS 4.0 RMON Ethernet Switch ZyNOS 4.0 Support Notes Version 4.00 July 2011 Overview Remote Monitoring (RMON) is a standard monitoring specification that enables various network monitors and console systems to

More information

ForeScout CounterACT. Configuration Guide. Version 1.8

ForeScout CounterACT. Configuration Guide. Version 1.8 ForeScout CounterACT Network Module: Wireless Plugin Version 1.8 Table of Contents About the Wireless Plugin... 4 Wireless Network Access Device Terminology... 6 How It Works... 6 About WLAN Controller/Lightweight

More information

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017 RSA NetWitness Logs Event Source Log Configuration Guide Trend Micro InterScan Messaging Security Suite Last Modified: Tuesday, April 25, 2017 Event Source Product Information: Vendor: Trend Micro Event

More information

IPv6 Implications on the Management Plane. Huawei, Shenzhen,

IPv6 Implications on the Management Plane. Huawei, Shenzhen, IPv6 Implications on the Management Plane Jürgen Schönwälder Huawei, Shenzhen, 2011-06-24 1 / 30 Introduction 1 Introduction 2 Plain IPv6 Management is Simple? 3 Scenario: IPv4-to-IPv6 Transition Mechanisms

More information

AlliedView -EMS 3.10 (Full Installation) DEVICE MANAGER USER S GUIDE

AlliedView -EMS 3.10 (Full Installation) DEVICE MANAGER USER S GUIDE AlliedView -EMS 3.10 (Full Installation) DEVICE MANAGER USER S GUIDE AlliedView -EMS 3.10 Device Manager User s Guide Page 1 of 133 TABLE OF CONTENTS 1 OVERVIEW... 6 2 STARTING DEVICE MANAGER... 7 2.1

More information

Setting Up the MPLS VPN Environment

Setting Up the MPLS VPN Environment CHAPTER 2 Cisco VPN Solutions Center: MPLS Solution is an MPLS VPN provisioning and auditing tool. The software focuses on the provider edge routers (PEs), customer edge routers (CEs), and the link between

More information

Lab 7: SNMP PDU Formats NET311 - Computer Network Management

Lab 7: SNMP PDU Formats NET311 - Computer Network Management Lab 7: SNMP PDU Formats NET311 - Computer Network Management Instructor: Dr. Mostafa Dahshan Objectives 1. Deeper understanding of SNMPv2 and SNMPv3 protocols. 2. Analyzing the formats of different SNMPv2

More information

Internet Engineering Task Force (IETF) Obsoletes: 5953 July 2011 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Obsoletes: 5953 July 2011 Category: Standards Track ISSN: Internet Engineering Task Force (IETF) W. Hardaker Request for Comments: 6353 SPARTA, Inc. Obsoletes: 5953 July 2011 Category: Standards Track ISSN: 2070-1721 Abstract Transport Layer Security (TLS) Transport

More information

Network Management & Monitoring Introduction to SNMP

Network Management & Monitoring Introduction to SNMP Network Management & Monitoring Introduction to SNMP These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

RSA NetWitness Logs. Cisco Wireless LAN Controller. Event Source Log Configuration Guide

RSA NetWitness Logs. Cisco Wireless LAN Controller. Event Source Log Configuration Guide RSA NetWitness Logs Event Source Log Configuration Guide Cisco Wireless LAN Controller Last Modified: Thursday, May 11, 2017 Event Source Product Information: Vendor: Cisco Event Source: Wireless LAN Controller

More information

Network Management & Monitoring Introduction to SNMP

Network Management & Monitoring Introduction to SNMP Network Management & Monitoring Introduction to SNMP Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license

More information

HT801/HT802 Firmware Release Note IMPORTANT UPGRADING NOTE

HT801/HT802 Firmware Release Note IMPORTANT UPGRADING NOTE HT801/HT802 Firmware Release Note IMPORTANT UPGRADING NOTE Once HT801/HT802 is upgraded to 1.0.3.2 or above, downgrading to 1.0.2.x firmware version or lower is not supported. Once HT801/HT802 is upgraded

More information