blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
8.1.1 SNMP Protocol Elements Connected: An Internet Encyclopedia
8.1.1 SNMP Protocol Elements

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1812
Up: 8. APPLICATION LAYER - NETWORK MANAGEMENT PROTOCOLS
Up: 8.1 The Simple Network Management Protocol - SNMP
Prev: 8.1 The Simple Network Management Protocol - SNMP
Next: 8.2 Community Table

8.1.1 SNMP Protocol Elements

8.1.1 SNMP Protocol Elements

Routers MUST be manageable by SNMP [MGT:3]. The SNMP MUST operate using UDP/IP as its transport and network protocols. Others MAY be supported (e.g., see [MGT:25, MGT:26, MGT:27, and MGT:28]). SNMP management operations MUST operate as if the SNMP was implemented on the router itself. Specifically, management operations MUST be effected by sending SNMP management requests to any of the IP addresses assigned to any of the router's interfaces. The actual management operation may be performed either by the router or by a proxy for the router.

DISCUSSION

This wording is intended to allow management either by proxy, where the proxy device responds to SNMP packets that have one of the router's IP addresses in the packets destination address field, or the SNMP is implemented directly in the router itself and receives packets and responds to them in the proper manner.

It is important that management operations can be sent to one of the router's IP Addresses. In diagnosing network problems the only thing identifying the router that is available may be one of the router's IP address; obtained perhaps by looking through another router's routing table.

All SNMP operations (get, get-next, get-response, set, and trap) MUST be implemented.

Routers MUST provide a mechanism for rate-limiting the generation of SNMP trap messages. Routers MAY provide this mechanism through the algorithms for asynchronous alert management described in [MGT:5].

DISCUSSION

Although there is general agreement about the need to rate-limit traps, there is not yet consensus on how this is best achieved. The reference cited is considered experimental.


Next: 8.2 Community Table

Connected: An Internet Encyclopedia
8.1.1 SNMP Protocol Elements

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609