

Push methods are the second group of information gathering techniques. CLI output is usually much more detailed than an SNMP query and requires more work on the part of the device to produce it. Like SNMP, we need to be careful about taxing the devices we're querying. Utilities like expect or scripting languages like python or go will allow information to be extracted by filtering CLI output to extract necessary data. Often, script access to the device's command-line interface (CLI) is the simplest method. When we need to get information that isn't available through a query, we need to resort to other options. SNMP is an older technology and the information that we can retrieve can be limited. Otherwise, we risk impact to network performance just by our active monitoring. Many networking devices don't have a lot of spare processor cycles for handling SNMP queries, so we should minimize the frequency and volume of retrieved information. We need to be careful when setting up SNMP queries. Others will deal with the connected links: bandwidth usage, link errors and status, queue overflows, &c. Some of these metrics will be central to device operation: CPU use, free memory, uptime, &c. This allows the station to compile trend data for key device metrics. SNMP information is usually polled from the monitoring station at five-minute intervals. These respectively added some bulk information retrieval functionality and improved privacy and security. Most equipment and software vendors have embraced and extended this body to varying degrees of consistency.įurther revisions (SNMPv2c, SNMPv2u and SNMPv3) came along in the 19d early 2000s. It began with a simple method for accessing a standard body of information called a Management Information Base or MIB. SNMP, the Simple Network Management Protocol has been at the core of query-based network monitoring since the early 1990s. We'll start with pull methods, where the network monitoring station and agents query devices for relevant information. Let's have a look at the tools available to us. Our monitoring strategy should use the right means to get the information we need with the least impact to the network's performance. In others, the devices themselves report information to the station and agents. In some cases, the monitoring station and its agents collect data from devices. A network monitor uses many mechanisms to get data about the status of its devices and interconnected links.
