If an organization has 1000 of devices then to check all devices, one by one everyday, are working properly or not is a hectic task. To ease these up, Simple Network Management Protocol (SNMP) is used.
Simple Network Management Protocol (SNMP) –
SNMP is an application layer protocol which uses UDP port number 161/162.SNMP is used to monitor network, detect network faults and sometimes even used to configure remote devices.
SNMP components –
There are 3 components of SNMP:
- SNMP Manager –
It is a centralised system used to monitor network.It is also known as Network Management Station (NMS)
- SNMP agent –
It is a software management software module installed on a managed device. Managed devices can be network devices like PC, router, switches, servers etc.
- Management Information Base –
MIB consists of information of resources that are to be managed. These information is organised hierarchically. It consists of objects instances which are essentially variables.
SNMP messages –
Different variables are:
- GetRequest –
SNMP manager sends this message to request data from SNMP agent. It is simply used to retrieve data from SNMP agent. In response to this, SNMP agent responds with requested value through response message.
- GetNextRequest –
This message can be sent to discover what data is available on a SNMP agent. The SNMP manager can request for data continously until no more data is left. In this way, SNMP manager can take knowledge of all the available data on SNMP agent.
- GetBulkRequest –
This message is used to retrieve large data at once by the SNMP manager from SNMP agent. It is introduced in SNMPv2c.
- SetRequest –
It is used by SNMP manager to set the value of an object instance on the SNMP agent.
- Response –
It is a message send from agent upon a request from manager. When sent in response to Get messages, it will contain the data requested. When sent in response to Set message, it will contain the newly set value as confirmation that the value has been set.
- Trap –
These are the message send by the agent without being requested by the manager. It is sent when a fault has occurred.
- InformRequest –
It was introduced in SNMPv2c, used to identify if the trap message has been received by the manager or not. The agents can be configured to set trap continuously until it receives an Inform message. It is same as trap but adds an acknowledgement that trap doesn’t provide.
SNMP security levels –
It defines the type of security algorithm performed on SNMP packets. These are used in only SNMPv3. There are 3 security levels namely:
- noAuthNoPriv –
This (no authentication, no privacy) security level uses community string for authentication and no encryption for privacy.
- authNopriv – This security level (authentication, no privacy) uses HMAC with Md5 for authentication and no encryption is used for privacy.
- authPriv – This security level (authentication, privacy) uses HMAC with Md5 or SHA for authentication and encryption uses DES-56 algorithm.
SNMP versions –
There are 3 versions of SNMP:
- SNMPv1 –
It uses community strings for authentication and use UDP only.
- SNMPv2c –
It uses community strings for authentication. It uses UDP but can be configured to use TCP.
- SNMPv3 –
It uses Hash based MAC with MD5 or SHA for authentication and DES-56 for privacy.This version uses TCP. Therefore, conclusion is the higher the version of SNMP, more secure it will be.
- Computer Network | User Datagram Protocol (UDP)
- Computer Network | Password authentication protocol (PAP)
- Computer Network | Routing Information Protocol (RIP)
- Computer Network | File Transfer Protocol (FTP)
- Computer Network | Dynamic Trunking Protocol (DTP)
- Computer Network | Types of Spanning Tree Protocol (STP)
- Computer Network | Voice over Internet Protocol (VoIP)
- Computer Network | Challenge Handshake Authentication Protocol (CHAP)
- Computer Network | Internet Protocol version 6 (IPv6) Header
- Computer Network | Dynamic Host Configuration Protocol (DHCP)
- Computer Network | Open shortest path first (OSPF) protocol States
- Computer Network | Root Bridge Election in Spanning Tree Protocol
- Computer Network | Open shortest path first (OSPF) protocol fundamentals
- Computer Network | Features of Enhanced Interior Gateway Routing Protocol (EIGRP)
- Computer Network | Integrated services digital network (ISDN)
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.