The Basics of Network Management with SNMP

Network Management with SNMP

What Is The Simple Network Management Protocol?

SNMP (Simple Network Management Protocol) is a popular protocol for the management of networks, used for gathering and configuring information from network devices, such as hubs, printers, servers, switches, and routers on an IP (Internet Protocol) network, or any device which is network-capable. It is used for remotely monitoring and managing devices and their functions across a network, and has three components: SNMP agents, managed devices and network management systems (which are usually referred to as NMS). The managed devices are programmed to gather the information from the host device, to potentially store that information, and to be capable of forwarding the said information to the Network Management Station.

A SNMP agent is an item of software which is based on a host network device, for the purpose of collecting the programmed information and communicating it in the form of SNMP traps to the network management station. This station is used to monitor and control SNMP host devices by way of a system of simple messages, and it also conveys that information to the network monitoring team in the form of a type of report or alarm. The NMS is able to run several application processes which are designed to collect information about known devices on the network. This may be status information, for example the change in status of a router interface or switch port, changes in the device configuration or details relating to the performance of one of the managed devices.

It is often the case that other software applications which are loaded onto network management stations are proprietary, but they contain and operate TCP/IP (Transmission Control Protocol/Internet Protocol) standards based on SNMP. A good example of an SNMP application is HP OpenView.

Devices communicating with a NMS are quite often configured so that they belong to a known community, and they have a community string or password which provides the community authentication or identity. The later versions of SNMP comprise stronger forms of authentication and the encryption of SNMP messages. A NMS has to be a member of the community so that it can receive and view messages and or make changes in the configuration of the devices already in the community.

The agent software installed on to the host devices possess what is called a Management Information Base (MIB), which is a database with a list of the manageable objects linked to the device. When the device needs to report a change in the configuration or status, it sends a message, called a trap, to the community NMS, advising of the change.

There are a number of message types belonging to the NMS which it can use to make enquiries or make changes to the configuration on the managed devices, and these are as follows:

  • GET: This is used to ask for certain information from the managed device about an object on the device. It could be a request for the amount of disk space available on the device disk hard drive or for the status of a router interface.
  • GET-NEXT: This is used for requesting the value of the next managed object in the MIB belonging to the device.
  • SET: In this instance, the NMS can change the value of the managed object’s variable, if the object allows READ/WRITE access. Otherwise it will not be possible, if it is READ-ONLY.

The MIB on the managed device contains information organised in a hierarchical system which is identified by object identifiers, as they are known, which are universally recognised.

Picture courtesy of www.mytechportal.com

Recommended Posts | Network Management

Strong Cybersecurity for Your Network

How to Build a Strong Cybersecurity for Your Network

Many small business owners have migrated to the cloud for their daily business needs. Now companies can access their business files, make calls, and transfer information from anywhere. However, if your business isn’t careful you will become a potential target for cyber attacks and network breaches ...
Why Joomla Is The Way Forward For Websites

Why Joomla Is The Way Forward For Websites

Joomla is now widely used around the world as a Content Management System. This type of platform can aid you in deploying content which is managed according to your requirements. Joomla offers many valuable features which means it is a good alternative to a traditional HTML-based website ...
The Web Hosting Network Management

The Web Hosting Network Management Guide: 3 Tips for Business Owners

We live in the digital age, where a growing number of markets and businesses are operating solely online. While this creates multiple opportunities for business owners, it also brings potential issues in terms of safeguarding intellectual property, preventing website downtime and reducing costs ...
What Is IP Address

How Does the Internet Work? What Is IP Address?

You've probably been wondering about this for some time. How does the Internet work anyway? Well, its designers and engineers really don't want you to have to worry about it. We say that the technology should be 'transparent' to the user. Like when you go to start your car ...