Home > MIB White Paper v4.qxp

MIB White Paper v4.qxp

Page 1
��How to Read and Understand the SNMP MIB...��
Instantly Understand Any SNMP Device...
Written by Marshall DenHartog
Is your SNMP knowledge good enough? What if you could instantly understand the capabilities of any SNMP device? Reading the SNMP MIB file is the best way to do that, and this guide teaches you how. This SNMP MIB white paper is a must-read for anyone who
works with SNMP...
Read this complete guide now: •Understand the purpose and function of the MIB... •Learn how to read the MIB... •Use the MIB to evaluate any SNMP equipment... Version 3.1 Released February 5, 2008
root ccitt (0) iso (1) org (3) dod (6) 1.3.6.1 internet (1) directory (1) mgmt (2) experimental (3) private (4) enterprises (1) dpsInc (2682) dpsAlarmControl (1) 1.3.6.1.4.1.2682.1 TMonXM (1) dpsRTU (2) dpsRTUsumPClr (102) joint-iso-ccitt (3) NetGuardian 832A T/Mon NOC
www.dpstelecom.com 1-800-622-3314
��We protect your network like your business depends on it��TM

Page 2
Demystifying the MIB • DPS Telecom • 4955 East Yale Avenue, Fresno, CA 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
2
Contents
What is the MIB? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 What does the MIB do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Why do I need the MIB?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 How do I get the MIB into my SNMP manager? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Why is the MIB important? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Why do I need to understand the MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 How do I look at a MIB? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Will I need to edit the MIB? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 How do I read the MIB? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 What does a MIB look like? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Wow! What language is that? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 How ASN.1 builds new terms out of existing terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 What terms are defined in the MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 What is the function of an OID?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 What does an OID look like? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 OK ... but what does it mean?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 When I look at my MIB files, I don��t see long strings of numbers like that . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 So every MIB file needs to describe the entire OID tree? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 How to avoid the most common cause of compile errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 So I��m reading the MIB What information am I looking for? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 The MIB objects you need to know . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 7 Reasons Why a Basic SNMP Manager is a Lousy Telemetry Master. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
About the Author
Marshall DenHartog has over ten years�� experience working with SNMP, including designing private MIB extensions, creating SNMP systems for multiple platforms, and developing SNMP-based monitoring for several nationwide networks. DenHartog��s experience with both the theoretical and practical sides of SNMP have equipped him to write a straightforward guide to the SNMP Management Information Base.
© Copyright 2008 DPS Telecom All rights reserved, including the right to reproduce this white paper or portions thereof in any form without written permission from DPS Telecom. For information, please write to DPS Telecom 4955 E. Yale Ave., Fresno, CA 93727-1523 • 1-800-622-3314 • whitepaper_info@dpstelecom.com Printed in the U.S.A

Page 3
What is the MIB?
The MIB, or Management Information Base, is an ASCII text file that describes SNMP network elements as a list of data objects. Think of it as a dictionary of the SNMP language — every object referred to in an SNMP message must be listed in the MIB.
What does the MIB do?
The fundamental purpose of the MIB is to translate numerical strings into human-readable text. When an SNMP device sends a Trap or other message, it identi- fies each data object in the message with a number string called an object identifier, or OID. (OIDs are defined more fully later in this paper.) The MIB provides a text label called for each OID. Your SNMP manager uses the MIB as a codebook for translating the OID numbers into a human-readable display.
Why do I need the MIB?
Your SNMP manager needs the MIB in order to process messages from your devices. Without the MIB, the message is just a meaningless string of numbers.
How do I get the MIB into my SNMP manager?
Your SNMP manager imports the MIB through a soft- ware function called compiling. Compiling converts the MIB from its raw ASCII format into a binary for- mat the SNMP manager can use.
Why is the MIB important?
Because as far as SNMP managers and agents are con- cerned, if a component of a network device isn��t described in the MIB, it doesn��t exist. For example, let��s say you have an SNMP RTU with a built-in temperature sensor. You think you��ll get tem- perature alarms from this device — but you never do, no matter how hot it gets. Why not? You read the RTU��s MIB file and find out that it only lists discrete points, and not the temperature sensor. Since the sensor isn��t described in the MIB, the RTU can��t send Traps with temperature data.
Why do I need to understand the MIB?
As you can see, the MIB is your best guide to the real capabilities of an SNMP device. Just looking at the physical components of a device won��t tell you what kind of Traps you can get from it. You might think it��s strange that a manufacturer would add a component to
Demystifying the MIB • DPS Telecom • 4955 East Yale Avenue, Fresno, CA 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
3 a device and not describe it in the MIB. But the fact is, a lot of devices have sketchy MIBs that don��t fully support all their functions. When you��re planning your SNMP monitoring, you need to be able to read MIBs so you can have a realis- tic idea of what capabilities you have. When you��re evaluating new SNMP equipment, examine its MIB file carefully before you purchase.
How do I look at a MIB?
A MIB file is just ASCII text, so you can view it in any word processor or text editor, such as Microsoft Notepad. Some manufacturers provide precompiled MIBs in binary format, but those aren��t readable. You want the raw ASCII version of the MIB file. Note: MIB files are sometimes provided as Unix text files. Unix text format is significantly different from DOS/Windows text format. DOS/Windows text files have a carriage return and a line feed at the end of each line; Unix files only have a line feed. If you want to view MIB files on a Windows PC, ask your vendor for a DOS-formatted version, or you can use a conversion utility to convert between text formats.
Will I need to edit the MIB?
Generally speaking, no. MIB files aren��t really designed to be edited by the end user. Theoretically, you could edit the text descriptions of managed objects to be more user-friendly, but it��s better to use your SNMP manager��s presentation software to create a useful display.
How do I read the MIB?
To read a MIB file, you have to understand just a little about how the MIB is structured. Don��t worry — you don��t have to master MIB notation in order to get use- ful information from the MIB. In this paper we��re going to cover just the essentials you need to know to discover the telemetry capabilities of SNMP devices.
What does a MIB look like?
For an example, here are the first few lines of the stan- dard DPS Telecom MIB file:
DPS-MIB-V38 DEFINITIONS ::= BEGIN IMPORTS DisplayString FROM RFC1213-MIB OBJECT-TYPE FROM RFC-1212 enterprises FROM RFC1155-SMI;

Page 4
dpsInc OBJECT IDENTIFIER ::= {enterprises 2682} dpsAlarmControl OBJECT IDENTIFIER ::= {dpsInc 1} tmonXM OBJECT IDENTIFIER ::= {dpsAlarmControl 1} tmonIdent OBJECT IDENTIFIER ::= {tmonXM 1} tmonIdentManufacturer OBJECT-TYPE SYNTAX DisplayString ACCESS read-only STATUS mandatory DESCRIPTION ��The TMON/XM Unit manufacturer.�� ::= {tmonIdent 1} tmonIdentModel OBJECT-TYPE SYNTAX DisplayString ACCESS read-only STATUS mandatory DESCRIPTION ��The TMON/XM model designation.��
Wow! What language is that?
The MIB is written in ASN.1 notation. (The initials stand for Abstract Syntax Notation 1.) ASN.1 is a standard notation maintained by the ISO (International Organization for Standardization) and used in everything from the World Wide Web to aviation control systems. A full description of ASN.1 is completely beyond the scope of this white paper — standard references to ASN.1 run up to 600 pages. For our purposes, there are only a few things to under- stand about ASN.1: 1. It��s human-readable. 2 It��s specifically designed for communication between dis- similar computer systems, so it��s the same for every machine. 3. It��s extensible, so it can be used for describing almost any- thing. 4. Once a term is defined in ASN.1, it can be used as a build- ing block for making other terms. This is very important for understanding MIB structure — you��ll see why later on.
How ASN.1 builds new terms out of existing terms
ASN.1 defines each term as a sequence of components, some of which may be sequences themselves. To give a simplified example, here��s how you might describe a letter in ASN.1:
Letter ::= SEQUENCE { opening OCTET STRING, body OCTET STRING, closing OCTET STRING, address AddressType }
Note that while most of the elements in this sequence are defined using a primitive element (the ��octet string,�� which is the equivalent of a byte), the address is simply defined as a
Demystifying the MIB • DPS Telecom • 4955 East Yale Avenue, Fresno, CA 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
4
3 SNMP RTUs to Fit Your Spec
The NetGuardian RTU family scales to fit your needs �� Full-featured NetGuardian 832A: • 32 discretes, 32 pings, 8 analogs and 8 controls • 8 terminal server serial ports • NEBS Level 3 certified • Dial-up backup • Web browser interface • Pager and email notification • Dual -48 VDC, -24 VDC or 110 AC • 1 RU for 19�� or 23�� rack Heavy-duty NetGuardian 480 • 80 discretes, 4 controls • Dual -48 VDC • 1 RU for 19�� or 23�� rack Economical NetGuardian 216 • 16 discretes, 2 analogs, 2 controls • 1 terminal server serial port • Single or dual -48VDC or 110 VAC • 2 compact form factors for rack or wall mount
http://www.dpstelecom.com/rtus
For more information about our entire line of RTUs visit us on the web for a live web demo to see which RTU is right for you.
http://www.dpstelecom.com/webdemo/

Page 5
Demystifying the MIB • DPS Telecom • 4955 East Yale Avenue, Fresno, CA 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
5
This RTU Grows with Your Network
When you��re planning your alarm monitor- ing, think about the future. You don��t want to get locked into an alarm system that��s inadequate for your future needs — but you don��t want to spend too much for alarm capacity you won��t immediately use, either. The NetGuardian 832A remote telemetry unit expands its capacity as your needs change. Install a NetGuardian at your remote site now, and get exactly the right coverage for your current needs. Then, as your remote site grows, you can extend your alarm monitoring capabilities by adding NetGuardian DX Expansion units. Each NetGuardian DX adds 48 more alarm points, and you can daisy-chain up to three NetGuardian DXs off each NetGuardian 832A base unit.
http://www.dpstelecom.com/ng-832a
Unit Capacity Base NG 832 32 1 DX 80 2 DX 128 3 DX 176 text string, ��AddressType.�� You can do this because AddressType is defined in another sequence, like so:
AddressType ::= SEQUENCE { name OCTET STRING, number INTEGER, street OCTET STRING, city OCTET STRING, state OCTET STRING, zipCode INTEGER }
For a computer parsing the sequence ��Letter,�� AddressType will be read as an instruction to insert the octet string and inte- ger structures listed in the sequence that defines AddressType
What terms are defined in the MIB?
The elements defined in the MIB can be extremely broad (for example, all objects created by private businesses) or they can be extremely specific (like a particular Trap message generat- ed by a specific alarm point on an RTU.) Each element in the MIB is given an object identifier, or OID. An OID is a number that uniquely identifies an element in the SNMP universe. Each OID is associated with a human-read- able text label.
What is the function of an OID?
The OIDs identify the data objects that are the subjects of an SNMP message. When your SNMP device sends a Trap or a GetResponse, it transmits a series of OIDs, paired with their current values. The location of the OID within the overall SNMP packet is shown in Figure 1.
What does an OID look like?
Here��s an example: 1.3.6.1.4.1.2681.1.2.102
OK ... but what does it mean?
The OID is a kind of address. It locates this particular element within the entire SNMP universe. The OID describes a tree structure, as shown in Figure 2, and each number separated by a decimal point represents a branch on that tree. The first few numbers identify the domain of the organization that issued the OID, followed by numbers that identify objects within the domain. Imagine if your home address started ��Universe, Milky Way Galaxy ...�� and ended with your house number. In a similar way, each OID begins at the root level of the OID domain and gradually becomes more specific. Each element of the OID also has a human-readable text des- ignation. From left to right, our sample OID reads: 1 (iso): The International Organization for Standardization,
NetGuardian DX: Expand your alarm monitor- ing capacity with NetGuardian DX Expansion Units.

Page 6
How to Get Better Visibility of Your SNMP Alarms
There��s a big difference between basic alarm monitoring and intelligent alarm management. Any basic system will give you some kind of notification of an alarm. But simple status reports don��t provide effective full visibility of your network. Automated Correction Your staff can��t hover around a screen watching for alarms with their full attention 24/7. A simple system cannot get alarm information to the people who can correct problems quick enough to make a differ- ence. And some problems require immedi- ate action far faster than any human being can respond. Intelligent Notification An intelligent alarm management system won��t just tell personnel there��s a problem; it will locate the problem, provide instruc- tions for corrective action, route alarm information directly to the people who need it, and, if possible, correct the problem auto- matically. Advanced features like these can make the difference between a minor inci- dent and major downtime. If you want these features, you need the T/Mon NOC Remote Alarm Monitoring System. T/Mon is a multiprotocol, multi- function alarm master with advanced fea- tures like programmable custom alarms, automatic alarm correction, e-mail and pager alarm notification and more. one of the two organizations that assign OID domains. 3 (org): An ISO-recognized organization. 6 (dod): U.S. Department of Defense, the agency originally responsible for the Internet. 1 (internet): Internet OID. 4 (private): Private organizations. 1 (enterprises): Business enterprises. 2682 (dpsInc): DPS Telecom. 1 (dpsAlarmControl): DPS alarm and control devices. 2 (dpsRTU): DPS remote telemetry unit. 102 (dpsRTUsumPClr): A Trap generated when all the alarm points on an RTU are clear.
When I look at my MIB files, I don��t see long strings of numbers like that
That��s because each element of an OID only needs to be defined once. Remember, in ASN.1 notation, once a term is defined, it can be used as a building block to define other terms. The last number of an OID — its most specific ele- ment — refers back to the more general elements defined earlier in the MIB. Here��s how the last four elements in our sample OID are defined in the DPS Telecom MIB:
dpsInc OBJECT IDENTIFIER ::= {enterprises 2682} dpsAlarmControl OBJECT IDENTIFIER ::= {dpsInc 1} dpsRTU OBJECT IDENTIFIER ::= {dpsAlarmControl 2} dpsRTUsumPClr TRAP-TYPE ENTERPRISE dpsRTU VARIABLES { sysDescr, sysLocation, dpsRTUDateTime } DESCRIPTION ��Generated when all points clear.�� ::= 102
Look at how each term is defined as the term that came immediately before it in the OID, plus one more element. For example, dpsInc is enterprises (1.3.6.1.4) plus one more element, called 2682. The next term, dpsAlarmControl, is dpsInc (1.3.6.1.4.2682), plus one more element, called 1. And so on. Each term in the OID is defined as an extension of earlier terms, going all the way back to the root term, iso.
Demystifying the MIB • DPS Telecom • 4955 East Yale Avenue, Fresno, CA 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
6
IP header UDP header version (0) community PDU type (0-3) request ID error status (0-5) error index OID value OID ... value IP datagram UDP datagram SNMP message common SNMP header get / set header variables to get / set
Figure 1. The OID identifies managed objects that can have assigned values

Page 7
An OID is meaningless unless every element it refers to is specifically called out and identified in the MIB. So when you��re compiling your MIB files on your SNMP manager, you need to supply not only the OIDs defined by your equipment vendor, but also OIDs for public entities: iso, org, dod, inter- net, and so on.
So every MIB file needs to describe the entire OID tree?
Fortunately, no. The upper levels of the OID tree — the parts that define the general OID structure — are defined in a series of standard reference MIB files called RFCs. (The initials stand for Request for Comment. The RFCs that define SNMP OIDs are part of a larger group of RFC docu- ments that define the Internet as a whole.) The RFC MIB defines a basic dictionary of terms that vendors use to write their own equipment-specific MIBs. So a vendor- created MIB doesn��t have to define the entire OID tree. The vendor��s MIB file only has to define the unique OIDs that describe the vendor��s equipment. At the beginning of every MIB file is an IMPORTS line that calls out the terms used in the MIB and the RFC MIB that defines those terms. Let��s take another look at the very beginning of the DPS Telecom MIB:
DPS-MIB-V38 DEFINITIONS ::= BEGIN IMPORTS DisplayString FROM RFC1213-MIB
Demystifying the MIB • DPS Telecom • 4955 East Yale Avenue, Fresno, CA 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
7
root iso (1) joint-iso-ccitt (3) ccitt (0) org (3) 1.3.6.1 dod (6) internet (1) directory (1) mgmt (2) experimental (3) private (4) enterprises (1) dpsInc (2682) dpsAlarmControl (1) TMonXM (1) dpsRTU (2) 1.3.6.1.4.1.2682.1 dpsRTUsumPClr
Figure 2. A branch of the MIB object identifier tree
Alarm Master Choice: T/Mon NOC
T/Mon NOC has many features to make your alarms more meaningful, including: 1. Detailed, plain English alarm descriptions include severity, location and date/time stamp. 2. Immediate notification of COS alarms, including new alarms and alarms that have cleared 3. Standing alarm list is continuously updated. 4. Text message windows displaying spe- cific instructions for the appropriate action for an alarm. 5. Nuisance alarm filtering, allowing your staff to focus its attention on seri- ous threats. 6. Pager and email notifications sent directly to maintenance personnel, even if they��re away from the NOC. 7. Derived alarms and controls that com- bine and correlate data from multiple alarm inputs and automatically control remote site equipment to correct com- plex threats. For more information, check out T/Mon on the Web at www.dpstelecom.com/tmon.
How to avoid the most common cause of compile errors
Your SNMP manager can��t compile your MIB files correctly unless it also compiles the RFC MIBs that your MIB files refer to. For example, to compile the DPS Telecom MIB, you need to compile RFC1213-MIB, RFC 1212 and RFC1155-SMI. Compile errors are often caused by missing RFC MIBs. RFC MIBs are publicly available on the Internet, or your vendor can supply the RFC MIBs you need.

Page 8
4. What characteristics of the device you can control via SNMP RFC MIBs The first thing you should look for in the MIB is what RFC MIBs are required to support this device. The necessary RFCs will be called out in the IMPORTS line at the beginning of the MIB. Traps: Event Reports For telemetry purposes, the MIB elements you��re most interested in are what Traps the device can send. Traps are often described as alarms, but it��s better to think of them as event reports. When a Trap is called out in the MIB, it means that the device is configured to generate a report whenever the element listed changes state. This doesn��t mean that the event is necessarily important. Many Traps are merely status messages. In SNMP v1 MIBs, Traps are always designated with the text label TRAP-TYPE. Here��s an example from the MIB for the DPS Telecom NetGuardian RTU::
dpsRTUp8005Set TRAP-TYPE ENTERPRISE dpsRTU VARIABLES { sysDescr, sysLocation, dpsRTUDateTime, dpsRTUAPort, dpsRTUCAddress, dpsRTUADisplay, dpsRTUAPoint, dpsRTUAPntDesc, dpsRTUAState } DESCRIPTION ��Generated when discrete point 5 is set.�� ::= 8005
Fortunately, you can ignore a lot of this gobbledygook.
OBJECT-TYPE FROM RFC-1212 enterprises FROM RFC1155-SMI;
From this IMPORTS line we can read that the DPS MIB is written using three terms defined in other MIBs — DisplayString, OBJECT-TYPE and enterprises — and these terms are defined in the RFC MIBs listed. All MIB files are written as extensions of the master RFCs. For this reason, you��ll sometimes hear people say that there��s only one MIB for all SNMP devices, and that individual MIB files are merely subsections of the unified Management Information Base. That may be true in theory, but in real life, you only need to worry about the equipment you use, the MIBs that support your equipment, and the RFCs that sup- port those MIBs.
So I��m reading the MIB. What informa- tion am I looking for?
You don��t need to carefully read over every last line of the MIB file. For your purposes, you��re only looking for particular items that will tell you what elements of the device you can monitor and control. A well-written MIB will be divided into sections. Sections will be identified by comment lines. (In MIB notation, comments lines are identified by two hyphens.) So if you find a line that reads something like:
—- TRAP definitions
You know you��ve found what you��re looking for. There are also text labels that identify the MIB objects you��re interested in. For example, in SNMP v1 MIBs, Traps are identified by the text label ��TRAP-TYPE.�� If you know the text labels for the kinds of objects you��re looking for, you can scan the MIB in a series of Ctrl-F searches.
The MIB objects you need to know
From the perspective of a telemetry manager, what you need to know from the MIB is: 1. What other RFC MIBs you need to support this device 2. What event reports (Traps) the device can send to the SNMP manager 3. What information you can request from the device (the SNMP equivalent of an alarm poll)
Demystifying the MIB • DPS Telecom • 4955 East Yale Avenue, Fresno, CA 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
8
I want to use a device feature that isn��t described in the MIB. What can I do?
You can ask the vendor to extend the MIB to include this feature. DPS Telecom has extended its MIB to support client needs. But you need to understand that extending a MIB is actually a soft- ware development project. The MIB is not just a text file. It��s also a software interface document to the embedded firmware of your SNMP device. Making additions to the MIB requires rewriting the device firmware. This is a serious project, involving writing code, debugging it, and undergoing a thorough quality assurance process.

Page 9
Here are the elements that you��re interested in: TRAP-TYPE: This tells you it��s a Trap. DESCRIPTION: This is a human-readable description of the Trap. It should give you a good basic indication of what the Trap signifies. VARIABLES: This tells you actual information will be included in the Trap. When an actual Trap is sent, each of these variables will be paired with a numerical value that indicates its current state. A variable-and-value pair is called a variable binding. The variables look pretty cryptic, but it��s easy to find out what they mean. Each variable is a text label for an OID defined elsewhere in the MIB. You can do a Ctrl-F search for any variable term and find its definition. For example, ��dpsRTUAPort�� is defined in the DPS MIB like this:
dpsRTUAPort OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION ��RTU port number.�� ::= {dpsRTUAlarmEntry 1}
Trap variables are your best guide to what alarms you��ll get from an SNMP device. Depending on the device, the variables can be highly detailed or they can be vague summary alarms. Object-Types: Data you can read and sometimes write When reading the MIB, you��ll also want to know what infor- mation you can directly request from the device, and what information you can send to the device. These functions are controlled by the SNMP commands GetRequest and SetRequest. If you want to translate these commands into classic telemetry terms, you can roughly think of a GetRequest as an alarm poll and a SetRequest as a control command. GetRequests and SetRequests operate on a type of element called an object-type. Object-types are called out in the MIB like this:
tmonAState OBJECT-TYPE SYNTAX DisplayString (SIZE (8)) ACCESS read-only STATUS mandatory DESCRIPTION ��The current alarm state.�� ::= {tmonAlarmEntry 4}
There are many different kinds of object-types. The specific object-types you might find in a MIB depend on the type of device, what kind of components it has, what the functions of those components, are, etc. You��re probably not going to be interested in every object-type
Demystifying the MIB • DPS Telecom • 4955 East Yale Avenue, Fresno, CA 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
9
Quick Primer on SNMP Messages
In SNMP v1, there are only 5 basic PDUs (program datagram units): GetRequest: a manager-to-agent message requesting the current value of a managed object. GetNext: a manager-to-agent message requesting the current value of the managed object one number after the one named in the request. (This is a way of walking down a table of values.) SetRequest: a manager-to-agent message that writes a new value to a managed object GetResponse: an agent-to-manager mes- sage in response to a GetRequest or a SetRequest. In either case, the message reports the current value of the managed object named in the manager��s request Trap: an agent-to-manager message report- ing a change in the value of a managed object
Learn about the MIB the Easy Way: Attend DPS Telecom Factory Training
Learn about the MIB and SNMP in- depth and hand-on, in a practical class that will teach you how to get the most from your network monitoring. At a DPS Factory Training Event, you��ll learn how to turn SNMP theory into a practical plan for improving your net- work visibility. It��s the easiest and most complete way to learn SNMP alarm monitoring from the technicians who have designed hundred of successful SNMP monitor- ing implementations. For Factory Training Events dates and information call 1-800-693-3314 today or see us on the Web at www.dpstele-
com.com/training.

Page 10
Demystifying the MIB • DPS Telecom • 4955 East Yale Avenue, Fresno, CA 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
10 listed in the MIB, because you��re not going to be interested in everything about the device��s functions. When searching for object-types, it��s helpful to start with a plan of what functions of the device you want to manage. What information do you want to retrieve? What controls do you want to set? Knowing the device��s functions and how you want to use them will help you narrow down what object-types you should look for in the MIB. Access The most important entry in an object-type description is the ACCESS line. This controls whether you can read and write the data described in the object-type. There are three access settings: not-accessible, read-only and read-write. Not-accessible means the object-type is there, but you can��t request the data in a GetRequest. Read-only means you can request the data in a GetRequest, but you can��t write new data for the object-type in a SetRequest. Read-write means you��re free to retrieve the data in a GetRequest and write new data for the object-type in a SetRequest. In the example of the alarm state object-type:
tmonAState OBJECT-TYPE SYNTAX DisplayString (SIZE (8)) ACCESS read-only STATUS mandatory DESCRIPTION ��The current alarm state.�� ::= {tmonAlarmEntry 4}
The access here is read-only, because the alarm state is set by the alarm input on that alarm point. Here��s an example of an object-type with read-write access:
dpsRTUDateTime OBJECT-TYPE SYNTAX DisplayString (SIZE (23)) ACCESS read-write STATUS mandatory DESCRIPTION ��The RTU system date and time.�� ::= {dpsRTUIdent 4}
Here the access is read-write, because this is a value that you can set from your SNMP manager. You can retrieve the current settings from the RTU��s internal clock through a GetRequest. And if the clock needs to be reset, you can write new data in a SetRequest.
DPS Telecom Guarantees You Won��t Fail — or Your Money Back
When you��re choosing a network monitoring vendor, don��t
7 Features That SNMP Managers Can��t Match
1. Detailed alarm notifications in plain English that your staff will immediately understand and take action on. 2. Immediate notification of changes of state (COSs), including new alarms and alarms that have cleared. 3. A continuously updated list of all cur- rent standing alarms. 4. Text message windows displaying spe- cific instructions for the appropriate action for an alarm. 5. Nuisance alarm filtering that eliminates meaningless status alarms and oscilla- tions allowing your staff to focus its attention on serious threats. 6. Pager and e-mail notifications. Send alarm notifications directly to mainte- nance personnel, even if they��re away from the NOC. 7. Derived alarms and controls that com- bine and correlate data from multiple alarm inputs and automatically control remote site equipment to correct com- plex threats.
The T/Mon NOC Remote Alarm Monitoring System provides total visibility of your network status and automatically notifies the right peo- ple to keep your network running.
Sign up for a Web demo of T/Mon NOC at
www.dpstelecom.com/webdemo

Page 11
Demystifying the MIB • DPS Telecom • 4955 East Yale Avenue, Fresno, CA 93727 • (800) 622-3314 • Fax (559) 454-1688 • www.dpstelecom.com
11
Price is Only the First Part of Cost Justification — Make Sure Your Vendor Offers Guaranteed Results
In my experience, clients who think hard about cost justification have a more important con- cern than just price. They want to make sure that they��re not spending their compa- ny��s money on a sys- tem that doesn��t work as advertised. That��s smart. You have to be careful when working with equipment vendors, especial- ly on protocol mediation projects. Most vendors can��t support all your legacy equipment, and they don��t have the development capabilities to make inte- gration work. Some vendors will charge you large NRE (non-refundable engineering) fees up front for custom work, and give no guarantee that the resulting product will meet your per- formance requirements. Personally, I think that��s a lousy way to do business. I give all my clients a 30-day guarantee: If my product doesn��t com- pletely satisfy you, return it for a full refund. If I can��t give you a solution, I don��t want your money. If I��m doing custom work for you, I don��t expect you to pay for it until I��ve proven that it works to your satisfaction. Very few vendors will make that guarantee. But you need to demand the best level of service from your vendor to ensure that your SNMP alarm monitoring deployment is 100% successful.
By Bob Berry Chief Executive Officer DPS Telecom
The DPS Telecom White Paper Series offers a complete library of helpful advice and survival guides for every aspect of system monitoring and control.
www.dpstelecom.com/white-papers
take chances. Be skeptical. Ask the hard questions. Above all, look for experience. Don��t take a sales rep��s word that his company can do custom development. Ask how many systems they��ve worked with, how many protocols they can integrate to SNMP, and check for client testimonials. DPS Telecom has created hundreds of successful SNMP mon- itoring implementations for telecoms, utility telecoms, and transportation companies. (Check out
www.dpstelecom.com/case-studies for some examples.) DPS
Telecom monitoring solutions are proven performers under real-world conditions. You��re never taking any risk when you work with DPS Telecom. Your SNMP monitoring solution is backed by a 30- day, no-risk, money-back guarantee. Test your DPS monitor- ing solution at your site for 30 days. If you��re dissatisfied for any reason, just send it back for a full refund.
What to Do Next
Before you make a decision about your SNMP monitoring, there��s a lot more you need to know. There��s dangers you want to avoid — and there��s also opportunities to improve your remote site maintenance that you don��t want to miss. Call or email Rick Dodd at 1-800-622-3314 or
rdodd@dpstele.com and ask for a free, live Web demonstra-
tion of SNMP monitoring solutions with the T/Mon NOC Remote Alarm Monitoring System. There��s no obligation to buy — no high-pressure salesmen — just straightforward information to help you make the best decision about your net- work monitoring. You��ll get complete information on hard- ware, software, specific applications, specifications, features and benefits . . . plus you��ll be able to ask questions and get straight answers. Call Rick at 1-800-622-3314 today to schedule your free Web demo of SNMP monitoring solutions — or register on the Web at www.dpstelecom.com/tmon-webde-
mo.

Page 12
��We protect your network like your business depends on it�� Remote Alarm Block 176N: Wire-wrap alarm block monitors 176 alarm points, 4 controls; reports to any SNMP manager, T/Mon NOC or T/Mon LT NetGuardian 216: RTU monitors 16 alarm points, 2 analog inputs, 2 control relays, 1 terminal server port; reports to any SNMP manager, T/Mon NOC or T/Mon LT. NetGuardian 480: RTU monitors 80 alarm points, 4 control relays; reports to any SNMP manager, TL1 master, T/Mon NOC or T/Mon LT NetGuardian 832A: RTU monitors 32 alarm points, 8 analog inputs, 8 control relays, 32 ping targets, 8 terminal server ports; reports to any SNMP manager, T/Mon NOC or T/Mon LT T/Mon NOC: Full-featured alarm master for up to 1 million alarm points. Features support for 25 protocols, protocol mediation, alarm forwarding, pager and email alarm notification, Web Browser access, multi-user access, standing alarm list, alarm history logging.
Alarm Monitoring Solutions from DPS Telecom
Alarm Monitoring Masters Remote Telemetry Units
T/Mon SLIM: Light capacity regional alarm master. Supports up to 64 devices and 7,500 alarm points. Features pager and email alarm notification, Web Browser access, standing alarm list and alarm history logging.
www.dpstelecom.com 1-800-622-3314
NetGuardian 16S: With 16 serial ports, integrated local audiovisual notification, two separate NICs, powerful alarm collection and versatile alarm reporting via SNMP Trap, email and pager, he NetGuardian-16S can handle any alarm monitoring need
Search more related documents:MIB White Paper v4.qxp
Download Document:MIB White Paper v4.qxp

Set Home | Add to Favorites

All Rights Reserved Powered by Free Document Search and Download

Copyright © 2011
This site does not host pdf,doc,ppt,xls,rtf,txt files all document are the property of their respective owners. complaint#downhi.com
TOP