logo

SNMP in Network Management: A Detailed Report

   

Added on  2023-01-19

12 Pages2240 Words29 Views
University
Semester
NETWORKING
Student ID
Student Name
Submission Date
1

Table of Contents
Section A...............................................................................................................................................3
1. Introduction to SNMP................................................................................................................3
2. Network Management - SNMP..................................................................................................3
3. SMMP Components...................................................................................................................3
4. SNMP Version...........................................................................................................................4
5. SNMP Working.........................................................................................................................4
Section B...............................................................................................................................................5
1. SNMP commands......................................................................................................................5
2. Assessing Target Hosts Using SNMP........................................................................................6
3. Switch MIBs..............................................................................................................................9
4. Port Identification......................................................................................................................9
5. Operational and Non-Operational Ports.....................................................................................9
6. VYOS Test Network..................................................................................................................9
Section C.............................................................................................................................................10
1. SNMP Traps............................................................................................................................10
2. Cyber Attack............................................................................................................................10
Section D.............................................................................................................................................11
2

Section A
In this section, we are explain the detailed report on SNMP in certain areas of
management and also explain the details of traditional SNMP controlled technologies and
areas covered by the various management systems.
1. Introduction to SNMP
Now a day, the complex network of servers, routers and switches and it can seem like
a daunting task to manage all the devices on network and make sure not only up and running
but also performing optimally. In this situation, the simple network management protocol
can help and it is used to provide users with a simple set of operations which allow these
devices are managed remotely. Basically, the SNMP is a set of operations which are provides
the administrators the ability to change the state of the SNMP based devices. It usually
associated with managing routers and it can be used to manage the many types of devices. It
allows the retrieval of SNMP information can be managed. In network management, it
consists of all the administrative actions taken to keep a network running efficiently.
2. Network Management - SNMP
In network management, the simple network management protocol is allows a device
to report information about its current operational state. It is most popular protocol for
supporting the network device monitoring. It also allows polling of individual designated
device attributes such as number of packets and system name received through the interface.
It is organized into tables, sets and records. While simplest switches and routers are quite
limited provisions for SMNP and provides the extensive support. The significant of SNMP
support which are sometimes referred as managed devices. The SNMP node that replies to
requests for information is called as SNMP agent. It is more simply to be a standalone tool
known as an SNMP browser or MIB browser. While most MIB browsers are used to
understand the graphical user interface and most command line tools of SNMP is snmpget
and snmpwalk command.
3. SMMP Components
SNMP Managers
The SNMP managers are is used to configure the computer to poll the SNMP
agent for information. The managers are send the query required to SNMP agent with
the credentials.
SNMP Agents
3

The SNMP agents are used to do the bulk of the work in network management
and the agents are responsible for gathering the information about the local system
and storing them in to format which can be queried. And, the updating the database is
called as management information base.
Management information base (MIB)
Basically, the MIB is a pre defined infrastructure and hierarchical structure
which is used to stores the information that can be queried or set. Generally the
SNMP agent computer configures which managers should have access to its
information. The SNMP agents are act as an intermediary to report the information on
devices.
4. SNMP Version
The SNMP has three versions such as
SNMPv1 - The SNMPv1 is collections of RFCs starting with RFC1065. It
considered a temporary network management protocol.
SNMPv2 - The SNMPv2 is expanding the basic information and RFCs
starting with RFC1442. It introduced the improved techniques
for managing tables. It also included the proposed security
mechanism.
SNMPv3 - The SNMPv3 is finally delivered a model for effective security.
The RFCs final version is in RFC3414.
5. SNMP Working
The SNMP performs the multitude of the function and relying on the mixture of pulls
and push communications between the network management and network devices. It can
issue write and read commands such as changing the configuration setting and resetting the
password. The SNMP is used to provide the report based on how much bandwidth, memory
and CPU in use and also the SNMP managers are automatically sending the text or email
message alert for administrator if a predefined threshold is exceeded.
The SNMP is still popular because it consumes the low network resources and it
requires the few processing capabilities. It has the capabilities to monitor the number of
processes are running on the particular device, information about the memory of the various
devices and CPU usages, graph and chart with traffic statistics. It has ability to allow more
the one device on network which to be used as managers. It easily identifies the any unusual
activities and defects by processing the information gathered by the managed device.
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
SNMP: Simple Network Management Protocol
|20
|4914
|153

Network Management Solution Assignment
|9
|1907
|53

Network Management - Part 1
|10
|1325
|206

Network Management Security
|10
|563
|74

Network Management Solutions: A Survey
|12
|1605
|321

Network Monitoring: Topology Selection, Zabbix Installation, SNMP Monitoring Setup, Performance Baseline, Shared Folder Troubleshooting
|11
|810
|61