Simple Network Management Protocol

Embed Size (px)

DESCRIPTION

Management Protocol

Citation preview

  • Simple Network Management Protocol 1

    Simple Network Management Protocol

    SNMPv3 STD0062

    Port(s) 161, 162 (Trap)

    RFC(s) 3411 3418

    OSI layer Application

    Secure SNMP

    Port(s) 10161, 10162 (Trap)

    RFC(s) 6353

    OSI layer Application

    Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on IPnetworks". Devices that typically support SNMP include routers, switches, servers, workstations, printers, modemracks and more. SNMP is used mostly in network management systems to monitor network-attached devices forconditions that warrant administrative attention. SNMP is a component of the Internet Protocol Suite as defined bythe Internet Engineering Task Force (IETF). It consists of a set of standards for network management, including anapplication layer protocol, a database schema, and a set of data objects.[1]

    SNMP exposes management data in the form of variables on the managed systems, which describe the systemconfiguration. These variables can then be queried (and sometimes set) by managing applications.

    Internetprotocol suite

    Application layer

    BGP DHCP

    DHCPv6 DNS FTP HTTP IMAP IRC LDAP MGCP NNTP NTP POP RPC RTP RTSP RIP SIP SMTP SNMP SOCKS

  • Simple Network Management Protocol 2

    SSH Telnet TLS/SSL XMPP more...

    Transport layer

    TCP UDP DCCP SCTP RSVP more...

    Internet layer

    IP IPv4 IPv6

    ICMP ICMPv6 ECN IGMP IPsec more...

    Link layer

    ARP/InARP NDP OSPF Tunnels

    L2TP PPP Media access control

    Ethernet DSL ISDN FDDI DOCSIS

    more...

    v t e [2]

  • Simple Network Management Protocol 3

    Overview and basic concepts

    Principle of SNMP Communication

    In typical SNMP uses, one or more administrative computers, calledmanagers, have the task of monitoring or managing a group of hosts ordevices on a computer network. Each managed system executes, at alltimes, a software component called an agent which reports informationvia SNMP to the manager.

    SNMP agents expose management data on the managed systems asvariables. The protocol also permits active management tasks, such asmodifying and applying a new configuration through remote modification of these variables. The variablesaccessible via SNMP are organized in hierarchies. These hierarchies, and other metadata (such as type anddescription of the variable), are described by Management Information Bases (MIBs).

    An SNMP-managed network consists of three key components: Managed device Agent software which runs on managed devices Network management station (NMS) software which runs on the managerA managed device is a network node that implements an SNMP interface that allows unidirectional (read-only) orbidirectional (read and write) access to node-specific information. Managed devices exchange node-specificinformation with the NMSs. Sometimes called network elements, the managed devices can be any type of device,including, but not limited to, routers, access servers, switches, bridges, hubs, IP telephones, IP video cameras,computer hosts, and printers.An agent is a network-management software module that resides on a managed device. An agent has localknowledge of management information and translates that information to or from an SNMP-specific form.A network management station (NMS) executes applications that monitor and control managed devices. NMSsprovide the bulk of the processing and memory resources required for network management. One or more NMSsmay exist on any managed network.

    Management information base (MIB)Main article: Management information baseSNMP itself does not define which information (which variables) a managed system should offer. Rather, SNMPuses an extensible design, where the available information is defined by management information bases (MIBs).MIBs describe the structure of the management data of a device subsystem; they use a hierarchical namespacecontaining object identifiers (OID). Each OID identifies a variable that can be read or set via SNMP. MIBs use thenotation defined by Structure of Management Information Version 2 (SMIv2, RFC 2578), a subset of ASN.1.

    Protocol detailsSNMP operates in the Application Layer of the Internet Protocol Suite (Layer 7 of the OSI model). The SNMP agentreceives requests on UDP port 161. The manager may send requests from any available source port to port 161 in theagent. The agent response will be sent back to the source port on the manager. The manager receives notifications(Traps and InformRequests) on port 162. The agent may generate notifications from any available port. When usedwith Transport Layer Security or Datagram Transport Layer Security requests are received on port 10161 and trapsare sent to port 10162.[3]

    SNMPv1 specifies five core protocol data units (PDUs). Two other PDUs, GetBulkRequest and InformRequest wereadded in SNMPv2 and carried over to SNMPv3.

  • Simple Network Management Protocol 4

    All SNMP PDUs are constructed as follows:

    IP header UDP header version community PDU-type request-id error-status error-index variable bindings

    The seven SNMP protocol data units (PDUs) are as follows:GetRequest

    A manager-to-agent request to retrieve the value of a variable or list of variables. Desired variables arespecified in variable bindings (values are not used). Retrieval of the specified variable values is to be done asan atomic operation by the agent. A Response with current values is returned.

    SetRequestA manager-to-agent request to change the value of a variable or list of variables. Variable bindings arespecified in the body of the request. Changes to all specified variables are to be made as an atomic operationby the agent. A Response with (current) new values for the variables is returned.

    GetNextRequestA manager-to-agent request to discover available variables and their values. Returns a Response with variablebinding for the lexicographically next variable in the MIB. The entire MIB of an agent can be walked byiterative application of GetNextRequest starting at OID 0. Rows of a table can be read by specifying columnOIDs in the variable bindings of the request.

    GetBulkRequestOptimized version of GetNextRequest. A manager-to-agent request for multiple iterations of GetNextRequest.Returns a Response with multiple variable bindings walked from the variable binding or bindings in therequest. PDU specific non-repeaters and max-repetitions fields are used to control response behavior.GetBulkRequest was introduced in SNMPv2.

    ResponseReturns variable bindings and acknowledgement from agent to manager for GetRequest, SetRequest,GetNextRequest, GetBulkRequest and InformRequest. Error reporting is provided by error-status anderror-index fields. Although it was used as a response to both gets and sets, this PDU was called GetResponsein SNMPv1.

    TrapAsynchronous notification from agent to manager. SNMP traps enable an agent to notify the managementstation of significant events by way of an unsolicited SNMP message. Includes current sysUpTime value, anOID identifying the type of trap and optional variable bindings. Destination addressing for traps is determinedin an application-specific manner typically through trap configuration variables in the MIB. The format of thetrap message was changed in SNMPv2 and the PDU was renamed SNMPv2-Trap. While in classiccommunication the client always actively requests information from the server, SNMP allows the additionaluse of so-called "traps". These are data packages that are sent from the SNMP client to the server withoutbeing explicitly requested.

    InformRequestAcknowledged asynchronous notification. This PDU was introduced in SNMPv2 and was originally definedas manager to manager communication. Later implementations have loosened the original definition to allowagent to manager communications. Manager-to-manager notifications were already possible in SNMPv1(using a Trap), but as SNMP commonly runs over UDP where delivery is not assured and dropped packets arenot reported, delivery of a Trap was not guaranteed. InformRequest fixes this by sending back anacknowledgement on receipt.

  • Simple Network Management Protocol 5

    Development and usage

    Version 1SNMP version 1 (SNMPv1) is the initial implementation of the SNMP protocol. SNMPv1 operates over protocolssuch as User Datagram Protocol (UDP), Internet Protocol (IP), OSI Connectionless Network Service (CLNS),AppleTalk Datagram-Delivery Protocol (DDP), and Novell Internet Packet Exchange (IPX). SNMPv1 is widely usedand is the de facto network-management protocol in the Internet community.Wikipedia:Citation neededThe first RFCs for SNMP, now known as SNMPv1, appeared in 1988: RFC 1065 Structure and identification of management information for TCP/IP-based internets RFC 1066 Management information base for network management of TCP/IP-based internets RFC 1067 A simple network management protocolThese protocols were obsoleted by: RFC 1155 Structure and identification of management information for TCP/IP-based internets RFC 1156 Management information base for network management of TCP/IP-based internets RFC 1157 A simple network management protocolAfter a short time, RFC 1156 (MIB-1) was replaced by more often used: RFC 1213 Version 2 of management information base (MIB-2) for network management of TCP/IP-based

    internetsVersion 1 has been criticized for its poor security. Authentication of clients is performed only by a "communitystring", in effect a type of password, which is transmitted in cleartext. The '80s design of SNMP V1 was done by agroup of collaborators who viewed the officially sponsored OSI/IETF/NSF (National Science Foundation) effort(HEMS/CMIS/CMIP) as both unimplementable in the computing platforms of the time as well as potentiallyunworkable. SNMP was approved based on a belief that it was an interim protocol needed for taking steps towardslarge scale deployment of the Internet and its commercialization. In that time period Internet-standardauthentication/security was both a dream and discouraged by focused protocol design groups.Wikipedia:Citationneeded

    Version 2cSNMPv2 (RFC 1441RFC 1452), revises version 1 and includes improvements in the areas of performance,security, confidentiality, and manager-to-manager communications. It introduced GetBulkRequest, an alternative toiterative GetNextRequests for retrieving large amounts of management data in a single request. However, the newparty-based security system in SNMPv2, viewed by many as overly complex, was not widely accepted. This versionof SNMP reached the Proposed Standard level of maturity, but was deemed obsoleted by later versions.Community-Based Simple Network Management Protocol version 2, or SNMPv2c, is defined in RFC 1901RFC1908. SNMPv2c comprises SNMPv2 without the controversial new SNMP v2 security model, using instead thesimple community-based security scheme of SNMPv1. This version is one of relatively few standards to meet theIETF's Draft Standard maturity level, and was widely considered the de facto SNMPv2 standard. It too was laterobsoleted, by SNMPv3.User-Based Simple Network Management Protocol version 2, or SNMPv2u, is defined in RFC 1909RFC 1910. Thisis a compromise that attempts to offer greater security than SNMPv1, but without incurring the high complexity ofSNMPv2. A variant of this was commercialized as SNMP v2*, and the mechanism was eventually adopted as one oftwo security frameworks in SNMP v3.Wikipedia:Citation needed

  • Simple Network Management Protocol 6

    SNMPv1 & SNMPv2c interoperabilityAs presently specified, SNMPv2c is incompatible with SNMPv1 in two key areas: message formats and protocoloperations. SNMPv2c messages use different header and protocol data unit (PDU) formats from SNMPv1 messages.SNMPv2c also uses two protocol operations that are not specified in SNMPv1. Furthermore, RFC 2576 defines twopossible SNMPv1/v2c coexistence strategies: proxy agents and bilingual network-management systems.

    Proxy agents

    A SNMPv2 agent can act as a proxy agent on behalf of SNMPv1 managed devices, as follows: A SNMPv2 NMS issues a command intended for a SNMPv1 agent. The NMS sends the SNMP message to the SNMPv2 proxy agent. The proxy agent forwards Get, GetNext, and Set messages to the SNMPv1 agent unchanged. GetBulk messages are converted by the proxy agent to GetNext messages and then are forwarded to the

    SNMPv1 agent.The proxy agent maps SNMPv1 trap messages to SNMPv2 trap messages and then forwards them to the NMS.

    Bilingual network-management system

    Bilingual SNMPv2 network-management systems support both SNMPv1 and SNMPv2. To support thisdual-management environment, a management application in the bilingual NMS must contact an agent. The NMSthen examines information stored in a local database to determine whether the agent supports SNMPv1 or SNMPv2.Based on the information in the database, the NMS communicates with the agent using the appropriate version ofSNMP.

    Version 3Although SNMPv3 makes no changes to the protocol aside from the addition of cryptographic security, it looksmuch different due to new textual conventions, concepts, and terminology.SNMPv3 primarily added security and remote configuration enhancements to SNMP.[4] Due to lack of security withthe use of SNMP, network administrators were using other means, such as telnet for configuration, accounting, andfault management.SNMPv3 addresses issues related to the large-scale deployment of SNMP, accounting, and fault management.Currently, SNMP is predominantly used for monitoring and performance management.SNMPv3 defines a secure version of SNMP and also facilitates remote configuration of the SNMP entities.SNMPv3 provides a secure environment for the management of systems covering the following: Identification of SNMP entities to facilitate communication only between known SNMP entities - Each SNMP

    entity has an identifier called the SNMPEngineID, and SNMP communication is possible only if an SNMP entityknows the identity of its peer. Traps and Notifications are exceptions to this rule.

    Support for security models - A security model may define the security policy within an administrative domain oran intranet. SNMPv3 contains the specifications for USM.

    Definition of security goals where the goals of message authentication service include protection against thefollowing: Modification of Information - Protection against some unauthorized SNMP entity altering in-transit messages

    generated by an authorized principal. Masquerade - Protection against attempting management operations not authorized for some principal by

    assuming the identity of another principal that has the appropriate authorizations. Message Stream Modification - Protection against messages getting maliciously re-ordered, delayed, or

    replayed to effect unauthorized management operations.

  • Simple Network Management Protocol 7

    Disclosure - Protection against eavesdropping on the exchanges between SNMP engines. Specification for USM - USM (User-based Security Model) consists of the general definition of the following

    communication mechanisms available: Communication without authentication and privacy (NoAuthNoPriv). Communication with authentication and without privacy (AuthNoPriv). Communication with authentication and privacy (AuthPriv).

    Definition of different authentication and privacy protocols - Currently, the MD5 and SHA authenticationprotocols and the CBC_DES and CFB_AES_128 privacy protocols are supported in the USM.

    Definition of a discovery procedure - To find the SNMPEngineID of an SNMP entity for a given transportaddress and transport endpoint address.

    Definition of the time synchronization procedure - To facilitate authenticated communication between the SNMPentities.

    Definition of the SNMP framework MIB - To facilitate remote configuration and administration of the SNMPentity.

    Definition of the USM MIBs - To facilitate remote configuration and administration of the security module. Definition of the VACM MIBs - To facilitate remote configuration and administration of the access control

    module.The SNMPv3 focuses on two main aspects, namely security and administration. The security aspect is addressed byoffering both strong authentication and data encryption for privacy. The administration aspect is focused on twoparts, namely notification originators and proxy forwarders.SNMPv3 defines a number of security-related capabilities. The initial specifications defined the USM and VACM,which were later followed by a transport security model that provided support for SNMPv3 over SSH and SNMPv3over TLS and DTLS. USM (User-based Security Model) provides authentication and privacy (encryption) functions and operates at the

    message level. VACM (View-based Access Control Model) determines whether a given principal is allowed access to a

    particular MIB object to perform specific functions and operates at the PDU level. TSM (Transport Security Mode) provides a method for authenticating and encrypting messages over external

    security channels. Two transports, SSH and TLS/DTLS, have been defined that make use of the TSMspecification.

    Security has been the biggest weakness of SNMP since the beginning. Authentication in SNMP Versions 1 and 2amounts to nothing more than a password (community string) sent in clear text between a manager and agent.Each SNMPv3 message contains security parameters which are encoded as an octet string. The meaning of thesesecurity parameters depends on the security model being used.SNMPv3 provides important security features: Confidentiality - Encryption of packets to prevent snooping by an unauthorized source. Integrity - Message integrity to ensure that a packet has not been tampered while in transit including an optional

    packet replay protection mechanism. Authentication - to verify that the message is from a valid source.As of 2004[5] the IETF recognizes Simple Network Management Protocol version 3 as defined by RFC 3411RFC3418 (also known as STD0062) as the current standard version of SNMP. The IETF has designated SNMPv3 a fullInternet standard,[6] the highest maturity level for an RFC. It considers earlier versions to be obsolete (designatingthem variously "Historic" or "Obsolete").In practice, SNMP implementations often support multiple versions: typically SNMPv1, SNMPv2c, and SNMPv3.[7]

  • Simple Network Management Protocol 8

    Implementation issuesSNMP implementations vary across platform vendors. In some cases, SNMP is an added feature, and is not takenseriously enough to be an element of the core design. Some major equipment vendors tend to over-extend theirproprietary command line interface (CLI) centric configuration and control systems.Wikipedia:VerifiabilitySNMP's seemingly simple tree structure and linear indexing may not always be understood well enough within theinternal data structures that are elements of a platform's basic design. Consequently, processing SNMP queries oncertain data sets may result in higher CPU utilization than necessary. One example of this would be large routingtables, such as BGP or IGP.Wikipedia:Citation needed

    Resource indexingModular devices may dynamically increase or decrease their SNMP indices (aka instances) whenever slottedhardware is added or removed. Although this is most common with hardware, virtual interfaces have the same effect.Index values are typically assigned at boot time and remain fixed until the next reboot. Hardware or virtual entitiesadded while the device is 'live' may have their indices assigned at the end of the existing range and possiblyreassigned at the next reboot. Network inventory and monitoring tools need to have the device update capability byproperly reacting to the cold start trap from the device reboot in order to avoid corruption and mismatch of polleddata.Index assignments for an SNMP device instance may change from poll to poll mostly as a result of changes initiatedby the system administrator. If information is needed for a particular interface, it is imperative to determine theSNMP index before retrieving the data needed. Generally, a description table like ifDescr will map a user friendlyname like Serial 0/1 (Blade 0, port 1) to an SNMP index.

    Security implications SNMP versions 1 and 2c are subject to packet sniffing of the clear text community string from the network traffic,

    because they do not implement encryption. All versions of SNMP are subject to brute force and dictionary attacks for guessing the community strings,

    authentication strings, authentication keys, encryption strings, or encryption keys, because they do not implementa challenge-response handshake.

    Although SNMP works over TCP and other protocols, it is most commonly used over UDP that is connectionlessand vulnerable to IP spoofing attacks. Thus, all versions are subject to bypassing device access lists that mighthave been implemented to restrict SNMP access, though SNMPv3's other security mechanisms should prevent asuccessful attack.

    SNMP's powerful configuration (write) capabilities are not being fully utilized by many vendors, partly becauseof a lack of security in SNMP versions before SNMPv3 and partly because many devices simply are not capableof being configured via individual MIB object changes.

    SNMP tops the list of the SANS Institute's Common Default Configuration Issues with the issue of default SNMPcommunity strings set to public and private and was number ten on the SANS Top 10 Most Critical InternetSecurity Threats [8] for the year 2000.

    AutodiscoverySNMP by itself is simply a protocol for collecting and organizing information. Most toolsets implementing SNMP offer some form of discovery mechanism, a standardized collection of data common to most platforms and devices, to get a new user or implementor started. One of these features is often a form of automatic discovery, where new devices discovered in the network are polled automatically. For SNMPv1 and SNMPv2c, this presents a security risk, in that your SNMP read communities will be broadcast in cleartext to the target device. While security

  • Simple Network Management Protocol 9

    requirements and risk profiles vary from organization to organization, care should be taken when using a feature likethis, with special regard to common environments such as mixed-tenant datacenters, server hosting and colocationfacilities, and similar environments.

    RFC references RFC 1155 (STD 16) Structure and Identification of Management Information for the TCP/IP-based Internets RFC 1156 (Historic) Management Information Base for Network Management of TCP/IP-based internets RFC 1157 (Historic) A Simple Network Management Protocol (SNMP) RFC 1213 (STD 17) Management Information Base for Network Management of TCP/IP-based internets:

    MIB-II RFC 1452 (Informational) Coexistence between version 1 and version 2 of the Internet-standard Network

    Management Framework (Obsoleted by RFC 1908) RFC 1901 (Experimental) Introduction to Community-based SNMPv2 RFC 1902 (Draft Standard) Structure of Management Information for SNMPv2 (Obsoleted by RFC 2578) RFC 1908 (Standards Track) Coexistence between Version 1 and Version 2 of the Internet-standard Network

    Management Framework RFC 2570 (Informational) Introduction to Version 3 of the Internet-standard Network Management

    Framework (Obsoleted by RFC 3410) RFC 2578 (STD 58) Structure of Management Information Version 2 (SMIv2) RFC 3410 (Informational) Introduction and Applicability Statements for Internet Standard Management

    Framework STD 62

    RFC 3411 An Architecture for Describing Simple Network Management Protocol (SNMP) ManagementFrameworks

    RFC 3412 Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) RFC 3413 Simple Network Management Protocol (SNMP) Applications RFC 3414 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol

    (SNMPv3) RFC 3415 View-based Access Control Model (VACM) for the Simple Network Management Protocol

    (SNMP) RFC 3416 Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP) RFC 3417 Transport Mappings for the Simple Network Management Protocol (SNMP) RFC 3418 Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)

    RFC 3430 (Experimental) Simple Network Management Protocol (SNMP) over Transmission ControlProtocol (TCP) Transport Mapping

    RFC 3584 (BCP 74) Coexistence between Version 1, Version 2, and Version 3 of the Internet-standardNetwork Management Framework

    RFC 3826 (Proposed) The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-basedSecurity Model

    RFC 5343 (Proposed) Simple Network Management Protocol (SNMP) Context EngineID Discovery RFC 5590 (Draft) Transport Subsystem for the Simple Network Management Protocol (SNMP) RFC 5591 (Draft) Transport Security Model for the Simple Network Management Protocol (SNMP) RFC 5592 (Proposed) Secure Shell Transport Model for the Simple Network Management Protocol (SNMP) RFC 5608 (Proposed) Remote Authentication Dial-In User Service (RADIUS) Usage for Simple Network

    Management Protocol (SNMP) Transport Models. RFC 6353 (Draft) Transport Layer Security (TLS) Transport Model for the Simple Network Management

    Protocol (SNMP)

  • Simple Network Management Protocol 10

    Further reading Douglas Mauro, Kevin Schmidt (2005). Essential SNMP, Second Edition. O'Reilly Media. p.462.

    ISBN0596008406.

    References[1] RFC 3411 An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks[2] http:/ / en. wikipedia. org/ w/ index. php?title=Template:IPstack& action=edit[3][3] RFC 6353 Section 10[4] In This Issue: SNMP Version 3 (http:/ / www. simple-times. org/ pub/ simple-times/ issues/ 5-1. html) The Simple Times (http:/ / www.

    simple-times. org/ ) ISSN 1060-6080[5] http:/ / en. wikipedia. org/ w/ index. php?title=Simple_Network_Management_Protocol& action=edit[6] RFC Editor (http:/ / www. rfc-editor. org/ categories/ rfc-standard. html) List of current Internet Standards (STDs)[7][7] RFC 3584 "Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework"[8] http:/ / www. sans. org/ top20/ 2000/

    External linksSimple Network Management Protocol (http:/ / www. dmoz. org/ / Computers/ Internet/ Protocols/ SNMP) atDMOZ

  • Article Sources and Contributors 11

    Article Sources and ContributorsSimple Network Management Protocol Source: http://en.wikipedia.org/w/index.php?oldid=611658213 Contributors: A-moll9, A.amitkumar, A0209129, AWak3N, Aapo Laitinen, Abune,Acmeacme, Adonaicanez, Adzinok, AgentOren, Alansohn, Aldie, AlephGamma, Alexav8, Allens, Alvin-cs, Amlz, AnAj, Andre Engels, Andreid84, Andrew Hampe, Angela, Anrie Nord, Anwarsaadat, Aozarov, Arleyl, Arthur Rubin, Attilios, Aylons, Banej, Bartjonkman, Behind The Wall Of Sleep, Beno1000, Billndotnet, Bluezy, Boklm, Bollyjeff, Bovineone, Brookshawn, CaSJer,Cadvga, Cbdorsett, Ccordray, Cdc, Chenzw, Chirag rajput, Chrisch, Chruck, Chuq, Cohesion, Cometstyles, Costello, Cp111, Cursorsequence, Cuado, Cybercobra, Darkfight, Darren23, DaveBraunschweig, DaveKrieger, David Battle, Dawnseeker2000, Dead3y3, Deadbeef, Dgtsyb, Dogcow, DoubleBlue, Dougher, Dragonfire X, Egorre, Ehevutov, Electriccatfish2, Emhoo, Emnico,EncMstr, Endpoint, Enjoi4586, Epbr123, Escape Orbit, EvanGrim, Florent Brisson, ForthOK, Fraggle81, Fragglet, Fudgepenis, GPHemsley, Gardar Rurak, Gh5046, Ghettoblaster, Gogo Dodo,Gprince007, Grafen, HamburgerRadio, Hardaker, Hashar, Helix84, Hooperbloob, Hu12, I dream of horses, IFaqeer, Ilovenagpur, Imarksmith, JFRich, JTN, Jackfork, Jetekus, Jim McKeeth,Jim1138, Jjarrettc, Jnc, Johnuniq, JonHarder, Jordan Brown, Joseaperez, Jpatokal, Jrosdahl, Julesd, Kbrose, Kgentryjr, Kjramesh, Knutux, Kokyun, Ksn, Ktdreyer, Kvng, Larry2342, LiDaobing,LimoWreck, Lkinkade, Lousyd, LukasRypl, Lukeritchie, Lzur, Maetrics, Maghnus, Maksym Pomerko, ManagementMan, Mancini, Mange01, ManuelGR, Maplebed, Marnues, Masirfan, MasterFrog-o, Mateo2, Materialscientist, Matt Darby, Matthew V Ball, Mayank06, Mentifisto, Michael Hardy, Mike Rosoft, Mindmatrix, Mojo-chan, MrOllie, Msjegan, Mwtoews, Nacken2008,Netdiva, Netsnipe, Nisan86, Nivix, Nixdorf, Nixeagle, Nizaros, Nnh, NotAnonymous0, Nubiatech, Oli Filth, Omniplex, Opello, Ouatic-7, Palica, Pathakhcst, Pedant17, PedroPVZ, Pete142,Pgilman, Phatom87, PhilKnight, Pmendl, Pmooney, Postrach, Prunesqualer, R'n'B, Rakeshchella, RandomAct, Ray Dassen, RedWolf, Rennata njitwill, Rikboven, Rimwolf, Rintojiang,Rogerio25, Ronz, Rookkey, RoySmith, Russvdw, Ruud Koot, SAE1962, SBaker43, Saikran.avulapati, Sanspeur, Satellizer, Schoff, Shadowjams, Sharewarepro, Sietse Snel, Skr15081997,Sleske, Smdunmyer, Socialjest404, Some jerk on the Internet, Sonic1980, Ssircar, Stewartadcock, Stewartjohnson, Stijn Vermeeren, Storm Rider, Stormie, Suffusion of Yellow, SuperDuffMan,Suruena, Swmcd, Tabrez, Tellyaddict, Tenbaset, The Anome, Thumperward, Tocharianne, Tree Biting Conspiracy, Trvth, USMstudent09, UU, UncleBubba, Uzume, Varnav, Velella,W1xiangzhuo, Wbenton, Widr, Wikichange7, William Wang, Williamyf, Wk muriithi, Woohookitty, Yaronf, Yhabibzai, YordanGeorgiev, Yurik, 753 anonymous edits

    Image Sources, Licenses and ContributorsFile:SNMP communication principles diagram.PNG Source: http://en.wikipedia.org/w/index.php?title=File:SNMP_communication_principles_diagram.PNG License: GNU FreeDocumentation License Contributors: Rene Bretz (updated by gh5046)

    LicenseCreative Commons Attribution-Share Alike 3.0//creativecommons.org/licenses/by-sa/3.0/

    Simple Network Management ProtocolOverview and basic conceptsManagement information base (MIB)Protocol details Development and usageVersion 1Version 2cSNMPv1 & SNMPv2c interoperabilityProxy agentsBilingual network-management system

    Version 3

    Implementation issuesResource indexingSecurity implicationsAutodiscovery

    RFC referencesFurther readingReferencesExternal links

    License