Preface | p. xiii |
Acknowledgments | p. xv |
Introduction: The Why and What of Network Management | p. 1 |
Why Manage Networks? | p. 3 |
What Is "Network Management"? | p. 5 |
Network Management Goal | p. 6 |
SNMP History | p. 7 |
Beginning Stages: 1980s | p. 8 |
Growth and Progress: Early 1990s | p. 9 |
Moving Toward the Future: Mid- to Late 1990s | p. 12 |
A Review of TCP/IP | p. 17 |
TCP/IP Stack Overview: Layer Responsibilities | p. 18 |
The Process Layer | p. 19 |
Host-to-Host Layer | p. 20 |
Internet Layer | p. 21 |
Network Interface Layer | p. 24 |
Live on Arrival | p. 25 |
Some Assembly Required | p. 26 |
SNMP and MIBs | p. 29 |
SNMP Overview | p. 31 |
An SNMP Model | p. 32 |
Manageable Objects | p. 33 |
Object Identifier | p. 33 |
Logical MIB Location | p. 34 |
SNMP, the Protocol | p. 35 |
Behind the Curtain | p. 35 |
The SNMP Agent | p. 36 |
Protocol Data Units | p. 38 |
NMS User Request Flow | p. 38 |
Agent Response Flow | p. 39 |
SNMP and MIB Details | p. 41 |
Structure and Identification of Management Information | p. 42 |
MIB Tables | p. 47 |
MIB-II Details | p. 51 |
From ISO to Host or How to Read 1.3.6.1.2.1 | p. 52 |
The System Group | p. 52 |
The Interfaces Group | p. 53 |
The IP Group | p. 58 |
The TCP Group | p. 68 |
The UDP Group | p. 71 |
EGP I/O Counters | p. 72 |
The Transmission Group | p. 75 |
The SNMP Group | p. 77 |
MIB-II Extensions | p. 81 |
Generic Interface Extensions | p. 84 |
AppleTalk Networking | p. 84 |
Open Shortest Path First | p. 84 |
Border Gateway Protocol | p. 87 |
Remote Network Monitoring | p. 88 |
Bridge Objects | p. 88 |
DECnet Phase IV | p. 88 |
Character Streams | p. 91 |
SNMP Parties and Secrets | p. 93 |
802.3 Repeater | p. 94 |
Routing Information Protocol | p. 95 |
Identification Protocol | p. 96 |
Host Resources MIB | p. 96 |
802.3 Medium Attachment Units | p. 97 |
Network Application Services Monitoring | p. 98 |
Mail Monitoring | p. 98 |
X.500 Directory Monitoring | p. 100 |
Interface Types and MIB | p. 100 |
Domain Name System | p. 101 |
Uninterruptible Power Supplies | p. 101 |
Systems Network Architecture Network Addressable Units | p. 102 |
Ethernet-like Interfaces | p. 107 |
SMDS Interface Objects | p. 108 |
ATM | p. 108 |
Dial-up Modems | p. 109 |
Relational Database | p. 109 |
Traffic Flow | p. 113 |
SNA SDLC | p. 113 |
Token Ring Station Source Route | p. 115 |
Printer | p. 115 |
Mobile IP | p. 117 |
IEEE 802.12 | p. 117 |
Data Link Switch | p. 117 |
Entity | p. 120 |
SNMPv2 Internet Protocol | p. 120 |
SNMPv2 Transmission Control Protocol | p. 122 |
SNMPv2 User Datagram Protocol | p. 122 |
Resource Reservation Protocol | p. 123 |
Integrated Services | p. 124 |
Repeaters | p. 124 |
System Application | p. 125 |
IPv6 | p. 127 |
ICMPv6 | p. 128 |
MARS | p. 129 |
Beyond MIB-II | p. 131 |
Experimental MIB Modules | p. 132 |
Private Entreprise MIBs | p. 132 |
Security | p. 133 |
SNMPv2 and SNMPv3 | p. 207 |
Mail | p. 213 |
SNMP Details | p. 217 |
SNMPv1 PDU Basics | p. 218 |
Generic SNMPv1 Message Format | p. 220 |
SNMPv1 PDU Layout | p. 223 |
SNMP Trap | p. 224 |
Large SNMP OID Values | p. 226 |
SNMPv2 Changes | p. 227 |
New Branches to the Management Tree | p. 229 |
Data Type Precision | p. 232 |
ASN.1 Macro Changes | p. 233 |
TEXTUAL-CONVENTION Macro | p. 234 |
SNMPv2 PDU Operations Changes | p. 234 |
SNMPv2c Common PDU Structure | p. 235 |
SNMPv2s Message Field Layout | p. 235 |
SNMPv2 Wrappers | p. 236 |
Transport Mapping Implementations | p. 238 |
SNMPv3 | p. 239 |
SNMP Evolution | p. 240 |
SNMPv3 | p. 240 |
The Changes | p. 243 |
Proxy Agents | p. 249 |
Bilingual NMS | p. 251 |
Network Management Applications | p. 253 |
NMA Functions | p. 254 |
Additional NMA Functions | p. 255 |
Leading-Edge NMA Functions | p. 255 |
NMA Product Support | p. 256 |
NMA Platform Support | p. 257 |
The Future of Network Management Applications | p. 257 |
Web-Based Network Management | p. 259 |
Web Server on Each Managed Device-Direct Communication | p. 260 |
Web Server as Proxy Agent-Intermediate Translation | p. 261 |
Challenges | p. 261 |
Other Coming Events | p. 262 |
X.700 Model of Network Management | p. 265 |
An X.700 Model of Network Management | p. 267 |
Configuration Management | p. 268 |
Accounting Management | p. 269 |
Performance Management | p. 269 |
Security Management | p. 270 |
Fault Management | p. 272 |
Configuration Management | p. 275 |
Public MIB Configuration Data | p. 276 |
Private MIB Configuration Data | p. 292 |
Accounting Management | p. 295 |
Asset Management | p. 296 |
Network Value Assessment | p. 301 |
Usage Auditing | p. 305 |
Performance Management | p. 309 |
Baselining | p. 310 |
Performance Counters | p. 310 |
Nodal Activity | p. 320 |
Network Activity Volumes | p. 322 |
Trend Analysis | p. 323 |
Remote Monitoring | p. 324 |
SNMP Traps | p. 339 |
Appendix RMON 1 and 2 MIBs | p. 341 |
Security Management | p. 363 |
Securing Agents and NMSs | p. 364 |
Community Name | p. 364 |
Encryption | p. 364 |
Protocol Analysis | p. 365 |
MIB-II Variables | p. 369 |
Firewall Issues | p. 373 |
SNMP Group Variables | p. 373 |
Fault Management | p. 375 |
Troubleshooting | p. 376 |
System Group Objects | p. 376 |
The Interface Group | p. 377 |
The IP Group | p. 382 |
The ICMP Group | p. 390 |
The TCP Group | p. 394 |
The SNMP Group | p. 397 |
Enterprise Numbers by Enterprise | p. 399 |
On the CD | p. 465 |
Index | p. 467 |
Table of Contents provided by Syndetics. All Rights Reserved. |