SlideShare a Scribd company logo
Simple Network
Management Protocol
SNMP
Introduction
• The Simple Network Management Protocol (SNMP) is by far, the
dominant protocol in network management.
• A key reason for its widespread acceptance, besides being the
chief Internet standard for network management is its relative
simplicity.
What is SNMP?
• SNMP is used for collecting information from network devices
like servers, switches, hubs, printers and routers on an Internet
Protocol (IP) network. It is a popular protocol for network
management.
• It is a part of Transmission Control Protocol Internet Protocol
(TCP⁄IP) protocol suite.
SNMP Management
• SNMP management has become the dominant standardized
network management scheme in use today.
• The SNMP set of standards provide a framework for the
definition of management information along with a protocol
for the exchange of that information.
• The SNMP model assumes the existence of managers and
agents.
How does SNMP work?
• The simple network management protocol
(SNMP) use for monitoring of network-
attached devices for any conditions that
warrant administrative attention. For
example all of the following devices can
use SNMP for managing devices on IP
networks:
• Network router
• Network switch
• Printer
• NAS server
• ADSL ISP router / modem
• Linux / UNIX / Windows servers
SNMP components
SNMP Manager
• A manager or management system
is a separate entity that is
responsible to communicate with
the SNMP agent implemented
network devices. This is typically a
computer that is used to run one or
more network management
systems.
SNMP Manager’s key functions
• Queries agents
• Gets responses from agents
SNMP components…
Managed Devices
• A managed device or the network element is a part of the
network that requires some form of monitoring and
management
• For example: Routers, Switches, Servers, Workstations,
Printers etc.
SNMPAgent
• The agent is a program that is packaged within the network
element. Enabling the agent allows it to collect the
management information database from the device locally and
makes it available to the SNMP manager, when it is queried
for.
SNMP agent’s key functions
• Collects management information about its local environment.
• Stores and retrieves management information as defined in the
MIB.
• Signals an event to the manager.
• Acts as a proxy for some non–SNMP manageable network
node.
SNMP Architecture
• To perform its monitoring services, SNMP uses a distributed
architecture of management systems and agents and several
related components.
• Windows Server provides an SNMP agent that is designed to
be capable of interacting with any SNMP manager.
SNMP Architecture…
BENEFITS
 Control: The benefits of running an SNMP-compliant
application include the abilities to prevent, detect, and correct
network-related issues
 Popularity: SNMP is virtually supported by every enterprise
network equipment manufacturer in the world.
 Efficiency :SNMP also utilizes the User Datagram Protocol
(UDP) to deliver packets called protocol data units (PDUs).
LIMITATIONS
 Simplicity: Because SNMP uses UDP as its transmission
protocol, it lacks many reliability and security issues.
 Security: Security has been a big concern with SNMPv1 and
SNMPv2. Neither provides adequate security features such as
management message authentication and encryption.
• Alternative :The Common Management Information Protocol
(CMIP) is another alternative to network management.
SNMP SECURITY
 Lacks authentication. Vulnerable to the variety of security
threats.
 Vulnerable to masquerading, modification of information,
time modifications, message sequencing and disclosures.
 Message sequence and timing modifications occurs when an
entity who is unauthorized reorders, delays, or copies and
later replays a message generated by an authorized entity.

More Related Content

Similar to 5-network-management-protocol.pptx

Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
Demented Naag
 
a
aa
group G
group Ggroup G
group G
s1120099
 
Week10
Week10Week10
Week10
Hayato
 
group presentation
group presentationgroup presentation
group presentation
s1120099
 
SNMP
SNMPSNMP
SNMP
s1160135
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
MOHD ARISH
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
Nilantha Piyasiri
 
How Network Management Systems
How Network Management SystemsHow Network Management Systems
How Network Management Systems
Tomoko Nishiuchi
 
Network management
Network managementNetwork management
Network management
Mohd Arif
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
tahaazad2
 
Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)
Shahrukh Ali Khan
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
QaswarBosan
 
Hp open view
Hp open viewHp open view
Hp open view
Ganesh Kumar Veerla
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
AnupomShill
 
Project report
Project reportProject report
Project report
ayush13bbm
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocol
ni35540
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
Nour Eldeen Mahmoud Khalifa
 
Snmp
SnmpSnmp
snmp
snmpsnmp

Similar to 5-network-management-protocol.pptx (20)

Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
a
aa
a
 
group G
group Ggroup G
group G
 
Week10
Week10Week10
Week10
 
group presentation
group presentationgroup presentation
group presentation
 
SNMP
SNMPSNMP
SNMP
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
How Network Management Systems
How Network Management SystemsHow Network Management Systems
How Network Management Systems
 
Network management
Network managementNetwork management
Network management
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)Slides of SNMP (Simple network management protocol)
Slides of SNMP (Simple network management protocol)
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Hp open view
Hp open viewHp open view
Hp open view
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Project report
Project reportProject report
Project report
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocol
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
 
Snmp
SnmpSnmp
Snmp
 
snmp
snmpsnmp
snmp
 

Recently uploaded

How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 

Recently uploaded (11)

How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 

5-network-management-protocol.pptx

  • 2. Introduction • The Simple Network Management Protocol (SNMP) is by far, the dominant protocol in network management. • A key reason for its widespread acceptance, besides being the chief Internet standard for network management is its relative simplicity.
  • 3. What is SNMP? • SNMP is used for collecting information from network devices like servers, switches, hubs, printers and routers on an Internet Protocol (IP) network. It is a popular protocol for network management. • It is a part of Transmission Control Protocol Internet Protocol (TCP⁄IP) protocol suite.
  • 4. SNMP Management • SNMP management has become the dominant standardized network management scheme in use today. • The SNMP set of standards provide a framework for the definition of management information along with a protocol for the exchange of that information. • The SNMP model assumes the existence of managers and agents.
  • 5. How does SNMP work? • The simple network management protocol (SNMP) use for monitoring of network- attached devices for any conditions that warrant administrative attention. For example all of the following devices can use SNMP for managing devices on IP networks: • Network router • Network switch • Printer • NAS server • ADSL ISP router / modem • Linux / UNIX / Windows servers
  • 6. SNMP components SNMP Manager • A manager or management system is a separate entity that is responsible to communicate with the SNMP agent implemented network devices. This is typically a computer that is used to run one or more network management systems. SNMP Manager’s key functions • Queries agents • Gets responses from agents
  • 7. SNMP components… Managed Devices • A managed device or the network element is a part of the network that requires some form of monitoring and management • For example: Routers, Switches, Servers, Workstations, Printers etc. SNMPAgent • The agent is a program that is packaged within the network element. Enabling the agent allows it to collect the management information database from the device locally and makes it available to the SNMP manager, when it is queried for.
  • 8. SNMP agent’s key functions • Collects management information about its local environment. • Stores and retrieves management information as defined in the MIB. • Signals an event to the manager. • Acts as a proxy for some non–SNMP manageable network node.
  • 9. SNMP Architecture • To perform its monitoring services, SNMP uses a distributed architecture of management systems and agents and several related components. • Windows Server provides an SNMP agent that is designed to be capable of interacting with any SNMP manager.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. BENEFITS  Control: The benefits of running an SNMP-compliant application include the abilities to prevent, detect, and correct network-related issues  Popularity: SNMP is virtually supported by every enterprise network equipment manufacturer in the world.  Efficiency :SNMP also utilizes the User Datagram Protocol (UDP) to deliver packets called protocol data units (PDUs).
  • 20. LIMITATIONS  Simplicity: Because SNMP uses UDP as its transmission protocol, it lacks many reliability and security issues.  Security: Security has been a big concern with SNMPv1 and SNMPv2. Neither provides adequate security features such as management message authentication and encryption. • Alternative :The Common Management Information Protocol (CMIP) is another alternative to network management.
  • 21. SNMP SECURITY  Lacks authentication. Vulnerable to the variety of security threats.  Vulnerable to masquerading, modification of information, time modifications, message sequencing and disclosures.  Message sequence and timing modifications occurs when an entity who is unauthorized reorders, delays, or copies and later replays a message generated by an authorized entity.

Editor's Notes

  1. 1