Simple Network Management Protocol (SNMP) is an application-layer protocol defined by the Internet Architecture Board (IAB) for exchanging management information between network devices. It is a part of the Transmission Control Protocol/Internet Protocol (TCP⁄IP) suite.

SNMP is one of the widely accepted protocols to manage and monitor network elements. Most of the professional-grade network elements come with bundled SNMP agent. These agents have to be enabled and configured to communicate with the network management system (NMS). The SNMP agent is a program that resides on your managed device, packaged within the network element. You have to enable it on your device. It collects the management information from the device locally and provides it to the SNMP manager. These agents could be standard, for example, Net-SNMP or specific to a vendor, such as HP Insight Agent.

SNMP credentials

SNMP uses a password-like authorization known as a community string. When you provide an SNMP credential to a device, it checks to see if the community string matches the community string configured on the device. If the string matches, the device responds to the SNMP query.

Discover the gateway using SNMP

To find the read-only gateway community string, one option is to:

  1. Log into the gateway WebUI.
  2. Click SNMP.

Or, you can get the read-only community string by logging into the gateway and reading the string in the /etc/snmp/snmpd.conf file.

You can change the community string to a name of your choice.

Multi-credential functionality

SNMP multi-credential functionality allows you to discover network resources using multiple credentials using a single discovery profile. You can create or use multiple credential sets if you are using a gateway to discover your resources.

For example, a printer uses SNMPv2c credential type and a Cisco router uses SNMPv3 credential type. In such a case, you need to create two discovery profiles. With SNMP multi-credential functionality, you can create one discovery profile and use both the credential sets.

The gateway discovers devices with the credentials, sequentially, as the credentials were entered when a Discovery Profile was created at the time of the first scan. After successful discovery, the gateway remembers resources and their credentials for subsequent discovery.

Multi-credentialed, SNMP-enabled devices have the following advantages:

  • Reduces the effort of creating multiple discovery profiles.
  • Reduces time for manually traversing through multiple discovery profiles to discover a network resource.
  • Scans and discovers a subnet with multiple SNMP community strings.
  • Discovers network resources working on different SNMP versions.

SNMP field values

The following provides information on configuring the SNMP fields for creating an SNMP credential set.

SNMPv1 and SNMPv2

FieldValueDescription
Port161Agent receives requests on UDP port 161.
CommunityN/ARead-only community string.

SNMPv3

SNMPv3 is a user-based security model. It provides secure access to the devices by combining authenticating and encrypting packets over the network. The security features provided in SNMPv3 are message integrity, authentication, and encryption.

FieldValueDescription
Port161SNMP Agent port. The default port is 161.
ContextN/ASpecify context name (an octet string) that identifies the collection of management information accessible by an SNMP entity.
Security NameN/AEnter the name of the user (principal) on whose behalf the message is being exchanged.
Security Level
  • NOAUTHNOPRIV
  • AUTHPRIV
  • AUTHNOPRIV
  • Communication without Authentication and Privacy
  • Communication with Authentication and Privacy
  • Communication with Authentication and without Privacy.
Authentication Protocol
  • MD5
  • SHA
Authentication in an SNMPv3 uses an encryption algorithm to determine if the data is from a valid source. The encryption algorithms for authentication:
  • Message Digest Algorithm: generates a 128-bit (16 bytes) message digest.
  • Secure Hash Algorithm: generates a 160-bit (20 bytes) message digest.
Authentication PasswordN/AEnter the Authentication password.
Confirm PasswordN/ARe-enter authentication password for validation.
Privacy Protocol
  • AES-128
  • AES-192
  • AES-256
  • DES
Privacy in SNMPv3 uses an encryption algorithm to encode the contents of an SNMPv3 packet. This encoding is used to verify that the content cannot be viewed by unauthorized entities when routed over the network.
  • Advanced Encryption Standard (AES 128) is a 128-bit standard, cryptographic algorithm that encrypts and decrypts data.
  • Advanced Encryption Standard (AES 192) is a 192-bit standard, cryptographic algorithm that encrypts and decrypts data.
  • Advanced Encryption Standard (AES 256) is a 256-bit standard, cryptographic algorithm that encrypts and decrypts data.
  • Data Encryption Standard (DES) is a 64-bit standard that encrypts and decrypts data.
Privacy PasswordN/AEnter the privacy password.
>Confirm PasswordN/ARe-enter authentication password for validation.
Connection time-outN/A - Default value: 10,000 millisecondsProvide a maximum time period for discovery. If the gateway does not get a response from the device after 10,000 milliseconds, it terminates the discovery.

SNMP definition requests

You can view and submit SNMP definitions for review.

Only Service Provider (SP) and partner-level users can submit SNMP definition requests. All user levels, including SP, partner, and client, can view existing definitions.

View SNMP definition requests

  1. Go to Setup > Resources.
  2. Click SNMP Device Type Definitions. This displays the list of available definitions, as shown in the example:
SNMP Definition List

Submit SNMP definition request

  1. Go to Setup > Resources.

  2. Click SNMP Device Type Definitions.

  3. Click the +Submit button.

  4. In the Add SNMP Device Type Definition page, enter the following information:

    Device Type Definition:

    FieldRequiredDescription
    Object OIDYesObject identifier.
    MakeYesChoose the make from the drop-down list.
    ModelNoIf you selected Model, choose the model from the drop-down list.
    Model OIDNoIf you selected Model OID, enter a model identifier.
    Device TypeYesChoose a device type from the drop-down list.
    Operating SystemYesChoose an operating system from the drop-down list.
    Serial Number OIDNoSerial number identifier.
    Firmware Revision OIDNoFirmware revision identifier.
    Hardware Revision OIDNoHardware revision identifier.
    Software Revision OIDNoSoftware revision identifier.

    SNMP OIDs for Network Interface Information:

    FieldRequired
    Number of InterfacesNo
    NameNo
    AliasNo
    IndexNo
    TypeNo
    SpeedNo
    Operational StatusNo
    Admin StatusNo
  5. Click Cancel to discard your definition or click Submit, which displays the following advisory message:

    This definition will reflect on devices only after it is reviewed by a vistara admin. You can check the status on the definition listing page.

  6. Click Yes to continue and submit your definition for review.