CELEBRATE EARTH WEEK
Save 70% on video training and simulators now through April 27*—use code EARTH. Shop now.
As the most effective set of automated tools for managing today's highly diverse, multivendor systems, SNMP (Simple Network Management Protocol), along with the RMON (Remote Network Monitoring) technology, is recognized as the de facto standard in the field of network management.
This book is the definitive guide to SNMP-based network and internetwork management for network administrators, managers, and designers. Concise, focusing on practical issues, and completely up to date, it covers SNMPv1, SNMPv2, and the most recent SNMPv3, as well as RMON1 and RMON2--all of which are currently deployed in today's LANs and WANs. With this book, you will be better equipped to determine your network management needs, gain insight into design issues, and obtain the necessary understanding to evaluate available SNMP-based products.
The author presents helpful background information, including an overview of network management requirements and an explanation of fundamentals such as network management architecture; performance, fault, and accounting monitoring; and configuration and security control.
You will also find detailed information on the specific protocols and operation of SNMPv1 and the enhancements made in SNMPv2 and SNMPv3, focusing in particular on this latest version's security features-message authentication code and encryption, USM (User-Based Security Model), and VACM (View-Based Access Control Model). The book provides an extensive discussion on standard MIBs (Management Information Bases), including MIB-II and the Ethernet Interface MIB. In addition, this third edition presents RMON1 and the RMON2 enhancements, looking at statistics collection, alarms, and filters. Throughout, the book highlights practical issues of network design, SNMP implementation, and daily operation.
To manage today's complex, multivendor network environments effectively and to plan intelligently for the future, you will need a thorough grasp of network management technology and standards. This comprehensive book will serve as your guide.
(All chapters, except Chapter 14, conclude with a Summary.)
Network Management Requirements.
Network Management Systems.
Outline of the Book.
Appendix 1a Internet Resources.
I. NETWORK MANAGEMENT FUNDAMENTALS.2. Network Monitoring.
Appendix 2a Queueing Theory Concepts.
Appendix 2b Statistical Analysis Concepts.3. Network Control.
II. SNMPV1.4. SNMP Network Management Concepts.
Basic Concepts.5. SNMP Management Information.
Structure of Management Information.
Appendix 5a TCP Connection States.6. Standard MIBs.
Ethernet Interface MIB.
Appendix 6a Case Diagrams.
Appendix 6b IP Addressing.7. Simple Network Management Protocol.
Appendix 7a Lexicographical Ordering.
III. RMON.8. Remote Network Monitoring: Statistics Collection.
tokenRing Extensions to RMON.
Appendix 8a EntryStatus Textual Convention.9. Remote Network Monitoring: Alarms and Filters.
Packet capture Group.
Practical Issues.10. RMON2.
Protocol Directory Group.
Protocol Distribution Group.
Address Map Group.
RMON2 Host Groups.
RMON2 Matrix Groups.
User History Collection Group.
Probe Configuration Group.
Extensions to RMON1 for RMON2 Devices.
IV. SNMPV2.11. SNMPv2: Management Information.
Structure of Management Information.
Appendix 11a Row-Status Textual Convention.12. SNMPv2: Protocol.
Coexistence with SNMPv1.13. SNMPv2: MIBs and Conformance.
SNMPv2 Management Information Base.
Evolution of the Interfaces Group of MIB-II.
Appendix 13a TestAndIncr Textual Convention.
V. SNMPV3.14. Cryptographic Algorithms in SNMPv3.
Conventional Encryption with DES.
The MD5 Secure Hash Function.
The SHA-1 Secure Hash Function.
Message Authentication with HMAC.15. SNMPV3: Architecture and Applications.
MIBs for SNMPv3 Applications.
Appendix 15a Textual Conventions for the SNMP Management Architecture.16. SNMPv3: Message Processing and User-Based Security Model.
The SNMPv3 User-Based Security Model.17. SNMPv3: View-Based Access Control Model.
The VACM Model.
Access Control Processing.
The VACM MIB.
Appendix 17a The Use of Subtrees and Masks.Appendices.
Operation of TCP and IP.
The TCP/IP Layers.
User Datagram Protocol.
TCP/IP Standards.Appendix B. Abstract Syntax Notation One.
ASN.1 Macro Definitions.
Basic Encoding Rules.
Alternative Encoding Rules.Glossary.