Download our free SNMP White Paper. Featuring SNMP Expert Marshall DenHartog.
This guidebook has been created to give you the information you need to successfully implement SNMP-based alarm monitoring in your network.
1-800-693-0351
Have a specific question? Ask our team of expert engineers and get a specific answer!
Sign up for the next DPS Factory Training!
Whether you're new to our equipment or you've used it for years, DPS factory training is the best way to get more from your monitoring.
Reserve Your Seat TodayWhile you're planning your SNMP network management, you should think about the quality of network management you want to achieve. SNMP is a simple protocol, but that doesn't limit what you can do with it.
A well-designed SNMP system will support advanced network management features. This includes:
Features like these will make your network more reliable, decrease downtime, and improve network services. All of which will keep your customers happy and give you an edge on your competition.
But whether you can use all these features depends on your SNMP manager and proxy agent. Not all SNMP devices provide the same level of functionality. Understanding what the right SNMP gear can do will help you determine what management features you need to get the most from SNMP.
The real power of SNMP isn't its small command set, but the way it describes devices.
Each device in an SNMP network is defined by a data file called the Management Information Base, or MIB. The MIB defines the device as a set of managed objects- values that can be read or changed by the SNMP manager. Managed objects can include alarm elements, controls, device uptime, or other aspects of the device.
Device elements must be listed in the MIB for them to be visible to the SNMP manager. All SNMP devices support a generic MIB that defines generic traps. But, to use advanced network management features, you need to be able to use granular traps that contain device-specific info. Granular traps require detailed MIBs that fully describe the managed objects of your devices.
Manufacturers of SNMP devices create their own unique set of MIBs to include device info not listed in the generic MIB. Some manufacturers create more detailed MIBs than others, so your choice of SNMP gear directly affects how well you can manage your network.
To truly unlock the potential of your SNMP network, understanding and leveraging MIB customization is crucial. While generic MIBs provide a foundation for basic device visibility, detailed, manufacturer-specific MIBs offer a deeper level of control and insight.
Custom MIBs can include managed objects that are critical to your operations, such as advanced environmental sensors, power supply metrics, or even unique operational statuses of specialized equipment. By working with manufacturers that provide detailed MIBs, you can ensure that all critical aspects of your devices are visible and manageable within your SNMP network.
Also, advanced SNMP tools often allow you to modify or extend MIBs. This capability enables you to adapt your monitoring to evolving requirements without replacing your existing hardware. With customizable MIBs, your SNMP manager can interpret new traps, integrate emerging technologies, and maintain a future-proof network.
The MIB of your SNMP proxy agent, for example, determines how much visibility you'll have of your non-SNMP devices. Devices that weren't built for SNMP don't have MIBs of their own. They appear on the SNMP network only because their managed objects are listed in the MIB of the proxy agent.
If your devices contain elements that are not defined in your proxy agent's MIB, the manager will never see them or know about them, and you'll have no visibility of them. Imagine how disastrous this can be if a crucial object of a non-SNMP device-an analog temperature sensor, for example-isn't defined in the proxy agent's MIB.
To get the most complete view of your network, you must assess the non-SNMP elements you need to monitor. Then, choose a proxy agent that provides the best MIB support of them.
Being able to make use of info from your devices is just as important as being able to collect it. To get the fullest visibility of your network, your SNMP manager must be able to accept, interpret, display and process the info sent by the SNMP proxy agent.
If you need to manage data from an SNMP proxy agent, one of your most important requirements for an SNMP manager is full support for detailed, granular traps. Remember, granular traps require info defined in manufacturer-specific MIBs. Not all SNMP managers can accept granular traps. Mainly traps from proxy agents mediating non-SNMP devices.
Out of the box, many SNMP managers can accept only generic traps. Adding granular trap capability requires creating a special software module for the manager, at considerable effort-or expense-for the user. More advanced managers will have built-in support for granular traps.
Another feature to consider is how your SNMP manager handles undefined traps. Some SNMP managers will not display or log undefined traps, leaving you with no visibility of serious network threats. Your SNMP manager should display when and where undefined traps happen, or at least write them to a log file.
Your SNMP manager should also be able to import and compile manufacturer-specific MIBs. This feature will allow you to directly select the managed objects you want to be notified of and assign them severity levels. This will not only give you the greatest visibility of your network, but it will also increase the flexibility of your network management.
A truly advanced SNMP manager isn't just for SNMP. For various reasons, you may want to bypass an SNMP proxy agent at some sites, while still integrating your network to a single manager. If so, you should look for a network management platform that can integrate SNMP and non-SNMP protocols on a single console.
Using one console will make your network management more reliable and less costly. You'll save on costs for gear, maintenance, and staff training. Your monitoring staff will not have to divide their attention between a lot of systems.
As networks increasingly blend SNMP and non-SNMP devices, security becomes a big concern. Non-SNMP devices can sometimes act as weak links in your network if they aren't properly integrated into a secure monitoring framework.
Modern SNMP managers can enhance network security by encrypting data transmissions using SNMPv3. This ensures that sensitive alarm data and control commands are protected from unauthorized access. When merging SNMP with non-SNMP protocols, ensure that your manager supports secure mediation, preserving data integrity across all connected devices.
Additionally, advanced SNMP managers allow you to create role-based access controls (RBAC) for monitoring and managing your network. This means you can limit access to specific devices, alarms, or controls based on user roles, reducing the risk of accidental or malicious changes to critical systems.
By prioritizing security alongside functionality, you can confidently merge SNMP and non-SNMP devices into a single, cohesive monitoring platform.
As we've seen, advanced SNMP gear can collect granular device data, display and process granular SNMP data, and even integrate SNMP with non-SNMP protocols. Having these capabilities will help you implement an intelligent alarm management system.
Intelligent alarm management does more than display network integrity threats - it processes alarm data to create complex automated responses when trouble happens.
An intelligent alarm management system can: