The Simple Network Management Protocol (SNMP) is a necessary tool for every network administrator. You can easily configure it with just a few commands.
SNMP is still the most popular way to monitor the performance of network devices, including Cisco routers and switches. With an SNMP management station, you can graph the performance of network devices. In addition, Cisco devices can send alerts (called traps) to the management station, which you can configure to alert you.
What is SNMP?
There are three versions of SNMP v1, v2, and v3. Each has more features than the next. Most network admins today use v2, but v3 offers many more security features.
How does SNMP work? SNMP devices contain configured SNMP agents. The network management system (NMS) talks to the SNMP agents on each device.
The NMS could be a huge system such as HP OpenView or an application that’s only there to track performance such as PRTG (which you can download from TechRepublic). For more detailed information on how SNMP works, check out Cisco’s Simple Network Management Protocol (SNMP) white paper.
How can SNMP help me?
SNMP can do a variety of things. Here are some ways it has helped me:
- It can graph Cisco router/switch bandwidth utilization over time, per interface, per direction, etc.
- It can graph errors on network devices (e.g., CRC errors).
- It can send alerts when an interface goes up or down.
Do I need an NMS?
Yes, you do need some kind of NMS to make SNMP useful. Configuring SNMP on its own really won’t tell you anything. You need an NMS that you can configure to receive, report, and graph the SNMP information.
How can I configure SNMP monitoring?
To configure SNMP, I suggest starting off with the optional step of identifying your device. Here’s an example:
Router(config)# snmp-server contact David Davis - Network Admin - 555-1212 Router(config)# snmp-server location Dallas, Texas, USA Router(config)# snmp-server chassis-id Cisco2610-Router
Next, we need to configure SNMP so that the NMS can monitor it. There are a great many ways to configure SNMP. For this example, we’ll configure the bare minimum to allow you to manage a Cisco router or switch.
To do this, we’ll create a community string. Think of a community string as a password for certain types of access to the device. Let’s configure this device to have a community string good for both reading and writing to the device. Here’s an example:
Router(config)# snmp-server community MyCommunity972 RW
Now our NMS, wherever it is on the network, can both read (i.e., view) and write (i.e., change) device configurations and statistics. (With a more advanced NMS, you can use SNMP to make configuration changes on your device, but that isn’t SNMP’s most popular use.)
We set our community string to MyCommunity972 for this example. Of course, set it using your own internal complex password.
How can I configure SNMP to send alerts?
At this point, we could stop the configuration and still use the NMS like PRTG to begin graphing bandwidth utilization on router or switch interfaces. But let’s take it a step further and configure the router or switch to alert the NMS when an interface goes down or up. To do this, you could use a free open source NMS such as OpenNMS or a commercial NMS such as Ipswitch’s WhatsUp.
We’ll configure the router or switch to send an SNMP trap to host 192.168.1.23 (the NMS) with our community string so we know it’s authentic. We want SNMP to send these traps if the interfaces go down or go up, or if someone reboots the router. Here are the commands:
Router(config)# snmp-server host 192.168.1.23 version 2c MyCommunity972 Router(config)# snmp-server enable traps snmp linkdown linkup coldstart warmstart
There are some SNMP vulnerabilities in certain versions of the Cisco IOS 12.0 to 12.3, so be cautious. Make sure you aren’t using one of the vulnerable versions, and take steps to configure SNMP as securely as possible.
While it’s easy to configure SNMP, configurations can also get very complex. I highly recommend taking the first step of using SNMP to develop a baseline of your router’s WAN interface utilization over time. From there, you could move on to more advanced uses for SNMP.
- Configuring SNMP Support (Cisco IOS version 12.4)
- Cisco IOS SNMP Traps Supported and How to Configure Them
- Using SNMP With the Security Appliances PIX/ASA
This post is by David Davis in the TechRepublic. I put it here so that more Network Administrators can find it. You can browse the original from TechRepublic here.
David Davis has worked in the IT industry for 12 years and holds several certifications, including CCIE, MCSE+I, CISSP, CCNA, CCDA, and CCNP. He currently manages a group of systems/network administrators for a privately owned retail company and performs networking/systems consulting on a part-time basis.