Snmp Agent Configuration - Cal Amp Phantom II Operating Manual

Wireless ethernet bridge/serial gateway
Table of Contents

Advertisement

6.1 Configuration
SNMP: Simple Network
Management Protocol provides
a method of managing network
devices from a single PC running
network management software.
Managed networked devices are
referred to as SNMP agents.
© CalAmp

6.1.4.4 SNMP Agent Configuration

The Phantom II may be configured to operate as a Simple Network
Management Protocol (SNMP) agent.
Network management is most important in larger networks, so as to
be able to manage resources and measure performance.
SNMP may be used in several ways:
configure remote devices
monitor network performance
detect faults
audit network usage
detect authentication failures
A SNMP management system (a PC running SNMP management
software) is required for this service to operate. This system must
have full access to the Phantom II network. Communications is in
the form of queries (information requested by the management sys-
tem) or traps (information initiated at, and provided by, the SNMP
agent in response to predefined events).
Objects specific to the Phantom II are hosted under private enter-
prise number 21703.
An object is a variable in the device and is defined by a Management
Information Database (MIB). Both the management system and the
device have a copy of the MIB. The MIB in the management system
provides for identification and processing of the information sent by a
device (either responses to queries or device-sourced traps). The
MIB in the device relates subroutine addresses to objects in order to
read data from, or write data to, variables in the device.
An SNMPv1 agent accepts commands to retrieve an object, retrieve
the next object, set an object to a specified value, send a value in
response to a received command, and send a value in response to
an event (trap).
SNMPv2c adds to the above the ability to retrieve a large number of
objects in response to a single request.
SNMPv3 adds strong security features including encryption; a shared
password key is utilized. Secure device monitoring over the Internet
is possible. In addition to the commands noted as supported above,
there is a command to synchronize with a remote management sta-
tion.
Phantom II
60

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents