13-4
Cisco ONS 15600 SDH Reference Manual, Release 9.0
78-18400-01
Chapter 13 SNMP
13.3 SNMP External Interface Requirement
Figure 13-3
Agent Gathering Data from a MIB and Sending Traps to the Manager
The SNMP agent captures data from MIBs, which are device parameter and network data repositories,
or from error or change traps.
A managed element—such as a router, access server, switch, bridge, hub, computer host, or network
element (such as an ONS 15600 SDH)—is accessed through the SNMP agent. Managed devices collect
and store management information, making it available through SNMP to other management systems
having the same protocol compatibility.
13.3 SNMP External Interface Requirement
Since all SNMP requests come from a third-party application, the only external interface requirement is
that a third-part SNMP client application can upload RFC 3273 SNMP MIB variables in the
etherStatsHighCapacityTable, etherHistoryHighCapacityTable, or mediaIndependentTable.
13.4 SNMP Version Support
The ONS 15600 SDH supports SNMPv1 and SNMPv2c traps and get requests. The ONS 15600 SDH
SNMP MIBs define alarms, traps, and status. Through SNMP, NMS applications can query a
management agent for data from functional entities such as Ethernet switches and SDH multiplexers
using a supported MIB.
Note
ONS 15600 SDH MIB files in the CiscoV1 and CiscoV2 directories are almost identical in content
except for the difference in 64-bit performance monitoring features. The CiscoV2 directory contains
three MIBs with 64-bit performance monitoring counters: CERENT-MSDWDM-MIB.mib,
CERENT-FC-MIB.mib, and CERENT-GENERIC-PM-MIB.mib. The CiscoV1 directory does not
contain any 64-bit counters, but it does support the lower and higher word values used in 64-bit counters.
The two directories also have somewhat different formats.
13.4.1 SNMPv3 Support
ONS 15600 SDH Software R9.0 and later supports SNMPv3 in addition to SNMPv1 and SNMPv2c.
SNMPv3 is an interoperable standards-based protocol for network management. SNMPv3 provides
secure access to devices by a combination of authentication and encryption packets over the network
based on the User Based Security Model (USM) and the View-Based Access Control Model (VACM).
•
User-Based Security Model
—The User-Based Security Model (USM) uses the HMAC algorithm
for generating keys for authentication and privacy. SNMPv3 authenticates data based on its origin,
and ensures that the data is received intact. SNMPv1 and v2 authenticate data based on the plain text
community string, which is less secure when compared to the user-based authentication model.
get, get-next, get-bulk
Network device
get-response, traps
32632
SNMP Manager
NMS
MIB
SNMP Agent