SlideShare a Scribd company logo
1 of 27
A Brief Introduction to InternetA Brief Introduction to Internet
Network Management andNetwork Management and
SNMPSNMP
Geoff HustonGeoff Huston
NTW Track 4NTW Track 4
What are we talking about?What are we talking about?
Network Management TasksNetwork Management Tasks
– fault managementfault management
– configuration managementconfiguration management
– performance managementperformance management
– security managementsecurity management
– inventory managementinventory management
– accounting managementaccounting management
Fault ManagementFault Management
detectiondetection
exception alarm generationexception alarm generation
investigation and analysisinvestigation and analysis
statistics for steady state behaviourstatistics for steady state behaviour
characterisationcharacterisation
Configuration ManagementConfiguration Management
installation of new hardware/softwareinstallation of new hardware/software
tracking changes in control configurationtracking changes in control configuration
– who, what and why!who, what and why!
revert/undo changesrevert/undo changes
change managementchange management
configuration auditconfiguration audit
– does it do what was intended?does it do what was intended?
IP Route ManagementIP Route Management
routing integrityrouting integrity
consistency with customer requirementsconsistency with customer requirements
consistency with external peersconsistency with external peers
conformance with imposed policyconformance with imposed policy
constraintsconstraints
Security ManagementSecurity Management
exception alarm generationexception alarm generation
detectiondetection
uniform access controls to resourcesuniform access controls to resources
backupbackup
Performance ManagementPerformance Management
Availability and Reliability metricsAvailability and Reliability metrics
Quality metricsQuality metrics
real-time measurementreal-time measurement
historical analysishistorical analysis
Accounting ManagementAccounting Management
identifying consumers and suppliersidentifying consumers and suppliers
– of network resourcesof network resources
mapping network resources to customermapping network resources to customer
identityidentity
charge backcharge back
– volumetric datavolumetric data
– time datatime data
– date time of daydate time of day
Problem TrackingProblem Tracking
reporting proceduresreporting procedures
fault managementfault management
escalation and referralescalation and referral
historical data for component reliabilityhistorical data for component reliability
analysisanalysis
Inventory ControlInventory Control
hardwarehardware
– componentscomponents
– identityidentity
– locationlocation
softwaresoftware
– version controlversion control
Knowledge Based ManagementKnowledge Based Management
"expert" systems"expert" systems
ModellingModelling
– simulationsimulation
– routingrouting
– configuration changesconfiguration changes
No single system will solve all your problemsNo single system will solve all your problems
or meet all your requirementsor meet all your requirements
Any Network Management package can onlyAny Network Management package can only
complement effective and efficientcomplement effective and efficient
operational proceduresoperational procedures
Need to identify what is important to you andNeed to identify what is important to you and
your organizationyour organization
SNMPSNMP
Simple Network Management ProtocolSimple Network Management Protocol
Doesn't SNMP solve all these problems ?Doesn't SNMP solve all these problems ?
– Don't be silly!Don't be silly!
SNMPSNMP
Where did it come from ?Where did it come from ?
– Internet Engineering Task ForceInternet Engineering Task Force
» Network Management AreaNetwork Management Area
– SNMP V1SNMP V1
– MIB definitionsMIB definitions
– SNMPV2SNMPV2
What is it ?What is it ?
more than just a protocol …more than just a protocol …
It defines an architecture for extractingIt defines an architecture for extracting
information from the network regarding theinformation from the network regarding the
current operational state of the network,current operational state of the network,
using a vendor-independent family ofusing a vendor-independent family of
mechanismsmechanisms
Structure of ManagementStructure of Management
Information (SMI)Information (SMI)
identifies and defines structure ofidentifies and defines structure of
management informationmanagement information
– RFC1155RFC1155
definesdefines
– commonly defined data itemcommonly defined data item
– syntax of the data typesyntax of the data type
– semantics of the data objectsemantics of the data object
SyntaxSyntax
uses ASN.1 (Abstract Syntax Notation)uses ASN.1 (Abstract Syntax Notation)
– binary encodingbinary encoding
02 01 06 is a 1 byte integer, value 6
Primitive TypesPrimitive Types
INTEGER, OCTECT STRING, OBJECT IDENTIFIER, NULL
Constructor TypesConstructor Types
SEQUENCE <primitive-type> ... ie. a record
SEQUENCE OF <primitive-type> ... ie. an array
SyntaxSyntax
Defined Data TypesDefined Data Types
IpAddress what you expect
Counter non-negative integer that wraps
Gauge non-negative integer that latches
TimeTicks time in hundredths of seconds
SNMP NAMESSNMP NAMES
S N M P N a m e S tru ctu re
1 - d ire c to ry
1 - s y s D e s c r 2 - s y s O b je c t I D
1 - s y s te m
1 - ifI n d e x 2 - ifD e s c r 3 - ifT y p e . . . . . . . . 1 0 - ifI n O c te ts
1 - ifE n t ry
1 - ifT a b le
2 - in te rfa c e s
1 - m ib
2 - m g m t 3 - e x p t
9 - c is c o
1 - E n t e rp ris e
4 - p riv a te
1 - I n te rn e t
6 - d o d
3 - o rg
1 - is o
SNMPSNMP
Management Information Base (MIB)Management Information Base (MIB)
– "database"of network objects"database"of network objects
– Groups:Groups:
» System, Interfaces, Address Translation, IP, ICMP,System, Interfaces, Address Translation, IP, ICMP,
TCP, UDP, EGPTCP, UDP, EGP
– "Access" and "Status" attributes"Access" and "Status" attributes
– actual variables are "instances" of OIDsactual variables are "instances" of OIDs
1.3.6.1.2.1.1.1.0 sysDescr
1.3.6.1.2.1.2.1.1.10.3 ifInOctets for interface 3
1.3.6.1.2.1.4.21.1.7.130.56.0.0
ipRouteNextHop for network 130.56.0.0
SNMPSNMP
The SNMP protocol itselfThe SNMP protocol itself
– allows inspection and alteration of MIBallows inspection and alteration of MIB
variablesvariables
UDP BasedUDP Based
– not acknowledged transactionsnot acknowledged transactions
PUT, GET, GET-NEXT operatorsPUT, GET, GET-NEXT operators
SNMPSNMP
SNMP TrapsSNMP Traps
– unsolicited notification of eventsunsolicited notification of events
– can include variable listcan include variable list
– ColdStart, WarmStartColdStart, WarmStart
– LinkUp, LinkDownLinkUp, LinkDown
– Authentication FailureAuthentication Failure
– EGP Neighbour LossEGP Neighbour Loss
– Enterprise SpecificEnterprise Specific
Network Management SoftwareNetwork Management Software
SNMP AgentsSNMP Agents
– provided by all router vendorsprovided by all router vendors
– many expanded (enterprise) MIBsmany expanded (enterprise) MIBs
– bridges, wiring concentrators, toastersbridges, wiring concentrators, toasters
Network Management SoftwareNetwork Management Software
Public DomainPublic Domain
– Application Programming Interfaces availableApplication Programming Interfaces available
from CMU and MITfrom CMU and MIT
– include variety of applicationsinclude variety of applications
Network Management SoftwareNetwork Management Software
CommerciallyCommercially
– many offerings, UNIX and PC basedmany offerings, UNIX and PC based
» HP OpenViewHP OpenView
» SunNet ManagerSunNet Manager
» Cabletron SpectrumCabletron Spectrum
» *MANY* others*MANY* others
Choosing a ManagementChoosing a Management
PlatformPlatform
Does it:Does it:
a) Support your systems ?a) Support your systems ?
b) Run on your platforms ?b) Run on your platforms ?
c) Meet your requirements ?c) Meet your requirements ?
d) Match your resources ?d) Match your resources ?
Choosing a ManagementChoosing a Management
PlatformPlatform
Maybe you can get away with somethingMaybe you can get away with something
quick and dirty using existing toolsquick and dirty using existing tools
Maybe a commercial management productMaybe a commercial management product
will meet your operational requirementswill meet your operational requirements

More Related Content

Viewers also liked

SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker ProjectPraveen Mathews
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSensePost
 
Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069William Lee
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-IIManageEngine
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolPrasenjit Gayen
 
Andrew Nelson - Zabbix and SNMP on Linux
Andrew Nelson - Zabbix and SNMP on LinuxAndrew Nelson - Zabbix and SNMP on Linux
Andrew Nelson - Zabbix and SNMP on LinuxZabbix
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMPAhmar Hashmi
 
Frankfinn Travel Assignment
Frankfinn Travel AssignmentFrankfinn Travel Assignment
Frankfinn Travel Assignmentprincessminu
 

Viewers also liked (16)

Snmp
SnmpSnmp
Snmp
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker Project
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Protocol snmp
Protocol snmpProtocol snmp
Protocol snmp
 
SNMP
SNMPSNMP
SNMP
 
Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
SNMP
SNMPSNMP
SNMP
 
Snmp
SnmpSnmp
Snmp
 
Introduction to SNMP
Introduction to SNMPIntroduction to SNMP
Introduction to SNMP
 
Andrew Nelson - Zabbix and SNMP on Linux
Andrew Nelson - Zabbix and SNMP on LinuxAndrew Nelson - Zabbix and SNMP on Linux
Andrew Nelson - Zabbix and SNMP on Linux
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
 
Frankfinn Travel Assignment
Frankfinn Travel AssignmentFrankfinn Travel Assignment
Frankfinn Travel Assignment
 
The Minimum Loveable Product
The Minimum Loveable ProductThe Minimum Loveable Product
The Minimum Loveable Product
 

Similar to Snmp

Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 
How SNMP Simulator Help In IT Companies?
How SNMP Simulator Help In IT Companies?How SNMP Simulator Help In IT Companies?
How SNMP Simulator Help In IT Companies?jamesjadam
 
How To Install and Configure SNMP on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7How To Install and Configure SNMP on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7VCP Muthukrishna
 
Unit 5.1 network 2.pptx
Unit 5.1 network 2.pptxUnit 5.1 network 2.pptx
Unit 5.1 network 2.pptxLilyMkayula
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Barry Greene
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days
 
Homebrew Your Own Metrics - An IBM Domino Administrator's Guide to SNMP (MWLU...
Homebrew Your Own Metrics - An IBM Domino Administrator's Guide to SNMP (MWLU...Homebrew Your Own Metrics - An IBM Domino Administrator's Guide to SNMP (MWLU...
Homebrew Your Own Metrics - An IBM Domino Administrator's Guide to SNMP (MWLU...Ray Bilyk
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocolGouasmia Zakaria
 
Intelligent traffic control decision support system
Intelligent traffic control decision support systemIntelligent traffic control decision support system
Intelligent traffic control decision support systemShubham Gulati
 
Tavve Zone Ranger
Tavve   Zone RangerTavve   Zone Ranger
Tavve Zone RangerJeff Olson
 
CCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokCCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokAhmed Gad
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdffashiionbeutycare
 
SNMP OPC Server from Transcend Automation
SNMP OPC Server from Transcend AutomationSNMP OPC Server from Transcend Automation
SNMP OPC Server from Transcend AutomationBaiju P.S.
 

Similar to Snmp (20)

Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
How SNMP Simulator Help In IT Companies?
How SNMP Simulator Help In IT Companies?How SNMP Simulator Help In IT Companies?
How SNMP Simulator Help In IT Companies?
 
How To Install and Configure SNMP on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7How To Install and Configure SNMP on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7
 
Unit 5.1 network 2.pptx
Unit 5.1 network 2.pptxUnit 5.1 network 2.pptx
Unit 5.1 network 2.pptx
 
snmp
snmpsnmp
snmp
 
SNMP vs CMIP
SNMP vs CMIPSNMP vs CMIP
SNMP vs CMIP
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
 
Homebrew Your Own Metrics - An IBM Domino Administrator's Guide to SNMP (MWLU...
Homebrew Your Own Metrics - An IBM Domino Administrator's Guide to SNMP (MWLU...Homebrew Your Own Metrics - An IBM Domino Administrator's Guide to SNMP (MWLU...
Homebrew Your Own Metrics - An IBM Domino Administrator's Guide to SNMP (MWLU...
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
 
Intelligent traffic control decision support system
Intelligent traffic control decision support systemIntelligent traffic control decision support system
Intelligent traffic control decision support system
 
Snmp
SnmpSnmp
Snmp
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Network Miner Network forensics
Network Miner Network forensicsNetwork Miner Network forensics
Network Miner Network forensics
 
Tavve Zone Ranger
Tavve   Zone RangerTavve   Zone Ranger
Tavve Zone Ranger
 
CCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the NetwokCCNA4v5 Chapter 8 - Monitoring the Netwok
CCNA4v5 Chapter 8 - Monitoring the Netwok
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
 
SNMP OPC Server from Transcend Automation
SNMP OPC Server from Transcend AutomationSNMP OPC Server from Transcend Automation
SNMP OPC Server from Transcend Automation
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Snmp

  • 1. A Brief Introduction to InternetA Brief Introduction to Internet Network Management andNetwork Management and SNMPSNMP Geoff HustonGeoff Huston NTW Track 4NTW Track 4
  • 2. What are we talking about?What are we talking about? Network Management TasksNetwork Management Tasks – fault managementfault management – configuration managementconfiguration management – performance managementperformance management – security managementsecurity management – inventory managementinventory management – accounting managementaccounting management
  • 3. Fault ManagementFault Management detectiondetection exception alarm generationexception alarm generation investigation and analysisinvestigation and analysis statistics for steady state behaviourstatistics for steady state behaviour characterisationcharacterisation
  • 4. Configuration ManagementConfiguration Management installation of new hardware/softwareinstallation of new hardware/software tracking changes in control configurationtracking changes in control configuration – who, what and why!who, what and why! revert/undo changesrevert/undo changes change managementchange management configuration auditconfiguration audit – does it do what was intended?does it do what was intended?
  • 5. IP Route ManagementIP Route Management routing integrityrouting integrity consistency with customer requirementsconsistency with customer requirements consistency with external peersconsistency with external peers conformance with imposed policyconformance with imposed policy constraintsconstraints
  • 6. Security ManagementSecurity Management exception alarm generationexception alarm generation detectiondetection uniform access controls to resourcesuniform access controls to resources backupbackup
  • 7. Performance ManagementPerformance Management Availability and Reliability metricsAvailability and Reliability metrics Quality metricsQuality metrics real-time measurementreal-time measurement historical analysishistorical analysis
  • 8. Accounting ManagementAccounting Management identifying consumers and suppliersidentifying consumers and suppliers – of network resourcesof network resources mapping network resources to customermapping network resources to customer identityidentity charge backcharge back – volumetric datavolumetric data – time datatime data – date time of daydate time of day
  • 9. Problem TrackingProblem Tracking reporting proceduresreporting procedures fault managementfault management escalation and referralescalation and referral historical data for component reliabilityhistorical data for component reliability analysisanalysis
  • 10. Inventory ControlInventory Control hardwarehardware – componentscomponents – identityidentity – locationlocation softwaresoftware – version controlversion control
  • 11. Knowledge Based ManagementKnowledge Based Management "expert" systems"expert" systems ModellingModelling – simulationsimulation – routingrouting – configuration changesconfiguration changes
  • 12. No single system will solve all your problemsNo single system will solve all your problems or meet all your requirementsor meet all your requirements Any Network Management package can onlyAny Network Management package can only complement effective and efficientcomplement effective and efficient operational proceduresoperational procedures Need to identify what is important to you andNeed to identify what is important to you and your organizationyour organization
  • 13. SNMPSNMP Simple Network Management ProtocolSimple Network Management Protocol Doesn't SNMP solve all these problems ?Doesn't SNMP solve all these problems ? – Don't be silly!Don't be silly!
  • 14. SNMPSNMP Where did it come from ?Where did it come from ? – Internet Engineering Task ForceInternet Engineering Task Force » Network Management AreaNetwork Management Area – SNMP V1SNMP V1 – MIB definitionsMIB definitions – SNMPV2SNMPV2
  • 15. What is it ?What is it ? more than just a protocol …more than just a protocol … It defines an architecture for extractingIt defines an architecture for extracting information from the network regarding theinformation from the network regarding the current operational state of the network,current operational state of the network, using a vendor-independent family ofusing a vendor-independent family of mechanismsmechanisms
  • 16. Structure of ManagementStructure of Management Information (SMI)Information (SMI) identifies and defines structure ofidentifies and defines structure of management informationmanagement information – RFC1155RFC1155 definesdefines – commonly defined data itemcommonly defined data item – syntax of the data typesyntax of the data type – semantics of the data objectsemantics of the data object
  • 17. SyntaxSyntax uses ASN.1 (Abstract Syntax Notation)uses ASN.1 (Abstract Syntax Notation) – binary encodingbinary encoding 02 01 06 is a 1 byte integer, value 6 Primitive TypesPrimitive Types INTEGER, OCTECT STRING, OBJECT IDENTIFIER, NULL Constructor TypesConstructor Types SEQUENCE <primitive-type> ... ie. a record SEQUENCE OF <primitive-type> ... ie. an array
  • 18. SyntaxSyntax Defined Data TypesDefined Data Types IpAddress what you expect Counter non-negative integer that wraps Gauge non-negative integer that latches TimeTicks time in hundredths of seconds
  • 19. SNMP NAMESSNMP NAMES S N M P N a m e S tru ctu re 1 - d ire c to ry 1 - s y s D e s c r 2 - s y s O b je c t I D 1 - s y s te m 1 - ifI n d e x 2 - ifD e s c r 3 - ifT y p e . . . . . . . . 1 0 - ifI n O c te ts 1 - ifE n t ry 1 - ifT a b le 2 - in te rfa c e s 1 - m ib 2 - m g m t 3 - e x p t 9 - c is c o 1 - E n t e rp ris e 4 - p riv a te 1 - I n te rn e t 6 - d o d 3 - o rg 1 - is o
  • 20. SNMPSNMP Management Information Base (MIB)Management Information Base (MIB) – "database"of network objects"database"of network objects – Groups:Groups: » System, Interfaces, Address Translation, IP, ICMP,System, Interfaces, Address Translation, IP, ICMP, TCP, UDP, EGPTCP, UDP, EGP – "Access" and "Status" attributes"Access" and "Status" attributes – actual variables are "instances" of OIDsactual variables are "instances" of OIDs 1.3.6.1.2.1.1.1.0 sysDescr 1.3.6.1.2.1.2.1.1.10.3 ifInOctets for interface 3 1.3.6.1.2.1.4.21.1.7.130.56.0.0 ipRouteNextHop for network 130.56.0.0
  • 21. SNMPSNMP The SNMP protocol itselfThe SNMP protocol itself – allows inspection and alteration of MIBallows inspection and alteration of MIB variablesvariables UDP BasedUDP Based – not acknowledged transactionsnot acknowledged transactions PUT, GET, GET-NEXT operatorsPUT, GET, GET-NEXT operators
  • 22. SNMPSNMP SNMP TrapsSNMP Traps – unsolicited notification of eventsunsolicited notification of events – can include variable listcan include variable list – ColdStart, WarmStartColdStart, WarmStart – LinkUp, LinkDownLinkUp, LinkDown – Authentication FailureAuthentication Failure – EGP Neighbour LossEGP Neighbour Loss – Enterprise SpecificEnterprise Specific
  • 23. Network Management SoftwareNetwork Management Software SNMP AgentsSNMP Agents – provided by all router vendorsprovided by all router vendors – many expanded (enterprise) MIBsmany expanded (enterprise) MIBs – bridges, wiring concentrators, toastersbridges, wiring concentrators, toasters
  • 24. Network Management SoftwareNetwork Management Software Public DomainPublic Domain – Application Programming Interfaces availableApplication Programming Interfaces available from CMU and MITfrom CMU and MIT – include variety of applicationsinclude variety of applications
  • 25. Network Management SoftwareNetwork Management Software CommerciallyCommercially – many offerings, UNIX and PC basedmany offerings, UNIX and PC based » HP OpenViewHP OpenView » SunNet ManagerSunNet Manager » Cabletron SpectrumCabletron Spectrum » *MANY* others*MANY* others
  • 26. Choosing a ManagementChoosing a Management PlatformPlatform Does it:Does it: a) Support your systems ?a) Support your systems ? b) Run on your platforms ?b) Run on your platforms ? c) Meet your requirements ?c) Meet your requirements ? d) Match your resources ?d) Match your resources ?
  • 27. Choosing a ManagementChoosing a Management PlatformPlatform Maybe you can get away with somethingMaybe you can get away with something quick and dirty using existing toolsquick and dirty using existing tools Maybe a commercial management productMaybe a commercial management product will meet your operational requirementswill meet your operational requirements