Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

SNMP simple Network Management Protocol

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

The predecessor of SNMP (Simple Network Management Protocol, simple Network Management Protocol) is simple Gateway Monitoring Protocol (SGMP), which is used to manage communication lines. Subsequently, people made a lot of changes to SGMP, especially the addition of SMI and MIB: architecture that meet the definition of Internet, and the improved protocol is the famous SNMP. The goal of SNMP is to manage the software and hardware platforms produced by many manufacturers on the Internet Internet, so SNMP is also greatly influenced by the Internet standard network management framework. Now SNMP has come out to the third version of the protocol, and its function has been greatly enhanced and improved than before.

Simple Network Management Protocol (SNMP), which consists of a set of network management standards, includes an application layer protocol (application layer protocol), a database model (database schema), and a set of data objects. The protocol can support the network management system to monitor whether the devices connected to the network have any management concerns. The protocol is part of the internet protocol suite defined by the Internet Engineering working Group (IETF,Internet Engineering Task Force).

Working process

In typical SNMP usage, many systems are managed, and one or more systems manage them. Each managed system runs a software component called agent, and reports information to the management system through SNMP.

Basically, SNMP agents present management data as variables. The management system retrieves information through GET,GETNEXT and GETBULK protocol instructions, or the agent uses TRAP or INFORM to transmit data without being questioned. The management system can also send requests for configuration updates or control to achieve the purpose of actively managing the system through SET protocol instructions. Configuration and control instructions are used only when the basic structure of the network needs to be changed, while monitoring instructions are usually routine.

Variables that can be accessed through SNMP are combined in a hierarchical manner. This hierarchy and other metadata, such as the type and description of variables, are described in a management information base (MIB).

The three-tier structure required:

1. NMS network manager station (network management workstation, which is a machine with specific management software)

2. AGENT (agent, which is server-side software running on the device)

3. Managed system equipment

Reporting method:

1. Polling:

Extract: GetRequest/GetNextRequest

Settings: SetRequest/GetResponse

2. Automatically:

Trap message

Build snmp under linux

Net-snmp-utils-5.3.2.2-7.el5.i386.rpm

Net-snmp-5.3.2.2-7.el5.i386.rpm

Snmpget snmpset snmpwalk

NMS udp 162snmptrapd Service

Supervise yourself, open snmpd [optional]

Build agent under linux

Net-snmp-5.3.2.2-7.el5.i386.rpm

Agent udp 161snmpd Service

Set up groups, groups, and users.

Snmp-agent (open agent)

Snmp-agent sys-info version all (allows all versions of the protocol)

Snmp-agent community write pubilc (set community name)

Snmp-agent sys-info contact zhangsan (Management)

Snmp-agent sys-info location jifang-1 (location)

Send messages automatically.

The failures reported by snmp-agent trap enable standard are as follows:

Snmp-agent target-host trap address udp-domain X.X.X.X udp-port params securityname public

Case 1: use two H4C firewalls, one Huawei switch, two pc as web server and one as NMS

Topology Diagram:

Fw1 configuration:

Int eth0/0

Ip add 192168.2.1 24

Int eth0/4

Ip add 192.168.3.1 24

Quit

Ip route-static 192.168.4.0 24 192.168.3.2

Ping 192.168.2.200

Firewall zone untrust

Add interface eth0/4

Quit

Configure agent

Snmp-agent

Snmp-agent community read public

Snmp-agent community write private

Snmp-agent sys-info contact zhangsan

Snmp-agent sys-info location jifang-1

Snmp-agent sys-info version all

Proactive report

Snmp-agent trap enable

Snmp-agent target-host trap address udp-domain 192.168.2.200 udp-port params securityname public

Snmp-agent trap enable standard? Select the reported failure later.

Fw2 configuration:

Int eth0/4

Ip add 192.168.3.2 24

Quit

Firewall zone untrust

Add interface eth0/4

Ping 192.168.3.1

Int eth0/0

Ip add 192.168.4.1

Quit

Ip route-static 192.168.2.0 24 192.168.3.1

Ping 192.168.2.200

Configure agent

Snmp-agent

Snmp-agent community read public

Snmp-agent community write private

Snmp-agent sys-info contact lisi

Snmp-agent sys-info location jifang-2

Snmp-agent sys-info version all

Proactive report

Snmp-agent trap enable

Snmp-agent target-host trap address udp-domain 192.168.2.200 udp-port params securityname public

Snmp-agent trap enable standard? Select the reported failure later.

Sw1 configuration

Int vlan-iterface 1

Ip add 192.168.4,2 24

Quit

Ip route-static 0.0.0.0 0 192.168.4.1

Ping 192.168.2.200

Configure agent

Snmp-agent

Snmp-agent community read public

Snmp-agent community write private

Snmp-agent sys-info contact lisi

Snmp-agent sys-info location jifang-2

Snmp-agent sys-info version all

Proactive report

Snmp-agent trap enable

Snmp-agent target-host trap address udp-domain 192.168.2.129 udp-port params securityname public

Snmp-agent trap enable standard? Select the reported failure later.

Web server configuration:

Control panel installs → software snmp

My computer → manages → service → SNMP server

Stop SNMP Trap Service

Next step: set up SNMP Service

Configure NMS, install the what` _ up software on another machine, and choose the default installation

Click file → New map wizard as shown below.

The settings are shown in the following figure:

Select as shown below

Complete:

The following results will be obtained:

Finally modify it as shown in the following figure:

So far, it's almost done. You can try to make it wrong.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report