SNMPV 3 and NNMi
SNMPV 3 and NNMi
May 2015
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e |2
Contents
Contents .................................................................................................................................................................. 2
SNMPv3 Introduction ............................................................................................................................................. 4
SNMPv3 Enhancements.................................................................................................................................... 4
SNMPv3 Goals .................................................................................................................................................... 4
Authoritative and Non-authoritative SNMP entities ...................................................................................... 4
SNMPv3 Configuration Modes .............................................................................................................................. 5
No Authentication and No Privacy ................................................................................................................... 5
Authentication with No Privacy ........................................................................................................................ 5
Authentication with Privacy .............................................................................................................................. 6
Authentication and Privacy Protocols ............................................................................................................. 6
Communication Configuration ............................................................................................................................. 6
User Name .......................................................................................................................................................... 6
Context Name .................................................................................................................................................... 6
Authentication passphrase and protocol ....................................................................................................... 6
Privacy passphrase /protocol .......................................................................................................................... 7
Configuring a Cisco Router.................................................................................................................................... 7
No Authentication with No Privacy configuration mode ............................................................................... 7
Authentication with No Privacy configuration mode ..................................................................................... 8
Authentication with Privacy configuration mode .......................................................................................... 8
How to decrypt a SNMPv3 packet in Wireshark ................................................................................................. 9
SNMPv3 Objects ................................................................................................................................................... 11
SNMPv3 Discovery ............................................................................................................................................... 11
One-stage discovery and two-stage discovery ........................................................................................... 14
SNMPv3 Communication..................................................................................................................................... 18
USM Report Codes that can be observed in a SNMPv3 packet ...................................................................... 21
List of Report PDUs ......................................................................................................................................... 21
SNMPv3 RFCs ....................................................................................................................................................... 22
NNMi Node Discovery, Configuration and Status Poll ..................................................................................... 23
Discovery and Configuration Poll................................................................................................................... 23
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e |3
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e |4
SNMPv3 Introduction
SNMP (Simple Network Management) is an internet standard protocol for managing devices on IP
networks. It supports both IPv4 and IPv6, and it is mostly used in network management systems (NMS) to
monitor network devices.
SNMPv3 Enhancements
SNMPv3 (SNMP version 3) provides security enhancements (over SNMP v1 and v2c) to the SNMP protocol
by adding the following to the SNMP packets that travel through the network
SNMPv3 Goals
From the RFC 3414 that describes the SNMPv3 protocol:
Provide for verification that each received SNMP message has not
been modified during its transmission through the network.
This enhances SNMPv1|2c where control was performed by community strings, sent in clear text through
the network.
The inconvenient is a more complex configuration needed on both sides, the agent and the manager.
The authoritative entities receive the SNMP requests (get, set, getnext and getbulk…) and the non-
authoritative entity request them.
In the NMS context, most of the time the manager is the non-authoritative entity and the agent the
authoritative one. For the purposes of this document, we will use the terms manager and non-
authoritative entity interchangeably. This also applies to agent and authoritative entity.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e |5
Example.
Example.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e |6
Example.
Communication Configuration
In order to establish a communication with an authoritative SNMP entity, the following parameters need to
be known by the non-authoritative SNMP entity.
User Name
Status: Mandatory
Description: A SNMPv3 user that has access to certain MIBs in the device.
Notes: SNMPv3 users need to be configured locally in the devices.
Context Name
Status: Optional
Description: A context is a collection of MIBs that are accessible by a SNMPv3 user.
Notes: It is optional as it may or may not be configured on the agent side.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e |7
Notes:
All commands below will be executed in the Cisco Configure Terminal Mode (configure terminal)
The Cisco 3640 router support the three SNMPv3 modes mentioned earlier
The SNMP group is used to specify the configuration mode, in this case, NoAuth
Create and attach the user to the recently created group (TestGroupNoAuth).
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e |8
Step 3. Test the configuration (CLI, from the NNMi Management Server)
The SNMP group is used to specify the configuration mode, in this case, AuthNoPriv
Create and attach the user to the recently created group (TestGroupAuth).
Step 3. Test the configuration (CLI, from the NNMi Management Server)
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e |9
The SNMP group is used to specify the configuration mode, in this case, AuthPriv
Step 2. Create an SNMP user using MD5 as the authentication protocol and DES for the privacy protocol
# snmp-server user TestUserPriv TestGroupPriv v3 auth md5 authPass priv des privPass
Step 3. Test the configuration (CLI, from the NNMi Management Server)
Steps
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 10
Result
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 11
SNMPv3 Objects
The non-authoritative engine needs to learn some values from the authoritative engine so that the
communication is allowed. Once that those values are learnt by the manager, then communication
(encrypted or plain text) can be initiated.
- snmpEngineID …
- snmpEngineBoots …
- snmpEngineTime …
As mentioned in the RFC, it is the responsibility of the non-authoritative SNMP engine to synchronize with
the authoritative SNMP engine. This synchronization process is known as SNMPv3 discovery, described
next.
SNMPv3 Discovery
From the RFC 3414 that describes the SNMPv3 protocol:
The User-based Security Model requires that a discovery process
obtains sufficient information about other SNMP engines in order to
communicate with them. Discovery requires a non-authoritative SNMP
engine to learn the authoritative SNMP engine's snmpEngineID value
before communication may proceed.
So, to initiate communication, the non-authoritative entity needs first to learn the authoritative
snmpEngineID.
How does the non-authoritative SNMP engine learns the authoritative snmpEngineID required for SNMPv3
communication?
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 12
The following images are packet captures that demonstrates the steps.
Request. A request is sent with no engineID, username, authentication or privacy information and the
varbind list left empty.
Response. A response is received that includes the Authoritative EngineID and the expected
“usmStatsUnknownEngineIDs” report PDU.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 13
Communication. The communication is then established using the newly learned Authoritative EngineID.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 14
It can be observed in the process above that no user authentication was performed (observe the
msgAuthenticationParameters field). This is because Authentication Protocol and Passphrase was not
configured in the Authoritative entity.
Note: *** This is not a recommended configuration as it does not introduce any significant
improvement over the SNMPv1 or SNMPv2c. For all production systems Authentication Security Level should
be used.
In the case that the Authentication Security Level is configured in the Authoritative Entity, the RFC 3414
states the following
To establish Time Synchronization two more values are needed to be learnt from the Authoritative entity:
snmpEngineBoots
snmpEngineTime
The need to learn these values introduce the one-stage or two-stage discovery process.
The following is a first response obtained from an Authoritative Entity as part of the discovery process. It
can be observed that the Authoritative Entity has provided the engineBoots and engineTime values on its
first response to the non-authoritative entity as part of the discovery process. At this time the non-
authoritative entity will be able to establish time synchronization and communication will be possible.
This process is known as one-stage discovery, as only one packet exchange between the manager and the
agent were required for the discovery process.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 15
Response. It includes the engineID and the required values of engineBoots and engineTime
However, there are occasions where the Authoritative Entity will not provide the engineBoots and
engineTime values on its first response. The following is an example.
Response. Notice that the engineID and the expected usmStatsUnknownEngineIDs report PDU are
received, but not the engineBoots and engineTime.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 16
How does the non-authoritative SNMP engine learns the authoritative engineBoots and engineTime
required to establish Time Synchronization?
It is required to send a second packet to the Authoritative Entity to obtain the information, hence the name
two-stage discovery.
The second packet will contain the newly learned engineID, a valid username, and the engineBoots and
engineTime values set to Zero. And in response, the Authoritative entity will respond with the engineTime,
engineBoots and the “usmStatsNotInTimeWindows” report PDU
Request
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 17
Response
Request
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 18
Response
Request
SNMPv3 Communication
Once that the non-authoritative entity has learnt the required values to communicate, the communication
can start.
Depending on the SNMPv3 Configuration Mode (NoAuthNoPriv, AuthNoPriv, AuthPriv), the subsequent
packets after the discovery need to be properly encoded for that configuration mode.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 19
Including a username does not provide Authentication, as the pass-phrase is the method use to
authenticate the user. Providing a username is a protocol requirement that is used to specify the user on
whose behalf the message is being exchanged, therefore, the user is required even when no
Authentication is configured.
Authentication Mode
If the User in question has been configured to use Authentication, then the msgAuthenticationParameters
must include the user’s authentication information. If the Authentication parameters are not included then
the agent will respond with an “usmStatsUnsupportedSecLevels” response PDU. Similarly, if the
information is incorrect then the agent will respond with an “usmStatsWrongDigests” response PDU. In
both scenarios, the agent terminates the communication.
Communication Examples
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 20
Authentication, No Privacy
Authentication, Privacy
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 21
This allows for proper communication between the manager and the agent. This is described in the RFC
3414, Sub-section 3.2 “Processing an Incoming SNMP Message”. Increasing the snmpEngineBoots value
allows the manager to detect the reboot, and keeping the snmpEngineTime value within 150 seconds has
been defined in the same RFC as “the window of time in which a message generated on behalf of any user
is valid” Please refer to the RFC 3414 for more details.
If trying to run an nnmsnmpwalk.ovpl against a v3 device then the tool will output the error in human-
readable form.
Packet example:
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 22
usmStatsNotInTimeWindows | .1.3.6.1.6.3.15.1.1.2
usmStatsUnknownUserNames | .1.3.6.1.6.3.15.1.1.3
Summary: Packet referenced a user that was not known to the SNMP engine
Possible reason: The user does not exist
usmStatsUnknownEngineIDs | .1.3.6.1.6.3.15.1.1.4
Summary: Packet referenced a snmpEngineID that was not known to the SNMP engine
Possible reason: The engineID is that the expected one. This is normal during v3 discovery.
usmStatsWrongDigests | .1.3.6.1.6.3.15.1.1.5
usmStatsDecryptionErrors | .1.3.6.1.6.3.15.1.1.6
SNMPv3 RFCs
The following is a list of SNMPv3 RFC documents that can become useful in the case that interoperability
issues occur or that it is desired to expand the knowledge of the protocol.
The list of RFCs has been taken from the following source:
http://www.snmp.com/protocol/snmp_rfcs.shtml (SNMP Research International, Inc, 2015)
RFC 3410. Introduction and Applicability Statements for Internet Standard Management Framework
RFC 3411. An Architecture for Describing SNMP Management Frameworks
RFC 3412. Message Processing and Dispatching
RFC 3413. SNMP Applications
RFC 3414. User-based Security Model
RFC 3415. View-based Access Control Model
RFC 3416. Version 2 of SNMP Protocol Operations
RFC 3417. Transport Mappings
Sign up for updates
hp.com/go/getupdated
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 23
The information collected during the SNMPv3 discovery process is cached within NNMi memory and used
for subsequent status polling.
Example of a Configuration Poll for a v3 node that has been already discovered by NNMi:
Image 20. SNMPv3 packets as seen in Wireshark during an NNMi Configuration Poll
Status Poll
During on demand or scheduled status poll, NNMi uses the cached SNMPv3 parameters for
communication.
Example of a Status Poll for a v3 node that has been already discovered by NNMi:
Image 21. SNMPv3 packets as seen in Wireshark during an NNMi Status Poll
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 24
Troubleshooting
Loggers
Use the loggers with caution since they may create a massive amount of data in an environment with
thousands of nodes being monitored
nnmsetlogginglevel.ovpl com.hp.ov.snmp
nnmsetlogginglevel.ovpl com.hp.ov.nms.comm
nnmsetlogginglevel.ovpl com.hp.ov.nms.snmp
Communication Configuration
Use the Actions > Configuration Details > Communication Configuration UI menu or the following command
to retrieve the communication settings for the node in question
Example:
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 25
Packet Capture
Use Wireshark on Windows, snoop on Solaris, nettl on HPUX or tcpdump on Linux to capture the
communication.
Then use Wireshark to decode the packets (if encrypted) as shown earlier on this document.
Problem Examples
usmStatsUnsupportedSecLevels - Configuration Poll
Possible Reason: NNMi is not configured with the correct privacy/authentication mode.
Solution: Configure NNMi properly
1) The device is already discovered therefore NNMi sends a request packet with the known v3
parameters.
2) The agent responds with “usmStatsNotInTimeWindows” “1.3.6.1.6.3.15.1.1.2”
3) The status poll fails
Possible Reason: The agent restarted, it did not update the engineBootCount and the engineTime
known by NNMi is incorrect.
Solution: Run a configuration poll against the device
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 26
The detailed description of the available security levels are documented in the NNMi 10.00 Deployment
Reference, page 49, section “SNMP Version Preferences”.
The following are the available security levels and a brief description:
Community Only (SNMPv1 only) NNMi will only use SNMPv1 to communicate with a device
Community Only (SNMPv1 or v2c) NNMi will try SNMPv2 first and if no response, NNMi will try
SNMPv1 to communicate with a device
Security levels can be configured at the Communication Settings > Default and Regional levels only. For
the Communication > Specific Node Settings, the user must choose one explicit protocol to communicate.
Every SNMPv3 Settings entry can be used at any Communication Configuration level (Default, Region, and
Specific Node Settings).
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 27
HMAC-MD5-96
HMAC-SHA-1
DES-CBC
TripleDES
AES-128
AES-192
AES-256
If using the Default or Region configuration levels, then the SNMP Minimum Security Level needs to be set
to “”Community” or one of the SNMPv3 Specific Security Levels (Authentication, Privacy and their
combinations).
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 28
If “Community” is chosen, and a valid SNMP Community String is also configured at the level, then NNMi
will succeed to communicate using SNMPv2c or SNMPv1 before it attempts to use SNMPv3, therefore
SNMPv3 will not be used.
In that case, if you need NNMi to use SNMPv3 you can try one of the following possible solutions:
Configure the agent to only support SNMPv3 (do not respond to the community string)
Configure NNMi to use a SNMPv3 Specific Security Level (at a Regional or Specific Level)
Example configuration
The image below shows an example configuration in the Regional Communication Configuration. The
SNMP Minimum Security Level has been set to the SNMPv3 Specific Level “Authentication, Privacy” and a
new SNMPv3 Settings entry has been added “testSNMPv3Setting”.
Under this configuration, for every node contained in this region, NNMi will try to communicate specifically
with SNMPv3 using the parameters in the “testSNMPv3Setting”configuration.
SNMPv3 Traps
The following has been taken from the NNMi 10.00 Deployment Reference
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 29
When NNMi uses SNMPv3 to communicate with a device, it uses a discovery process to identify the
Engine ID, boot count, and engine time of the device. NNMi then uses this information, along with
the configured user and protocol details, to start sending messages to the device. When the device
sends a trap to NNMi, the device may not have the NNMi information, and because a trap is a single-
packet transaction, it has no way to get the necessary information. Therefore, it uses its own Engine
ID, boot count and engine time in the trap, along with the user name and protocol details. These
device details must be the same as those configured for the device in NNMi. You cannot configure
multiple SNMPv3 users per device in NNMi.
NNMi 10.00 Deployment Reference, page 50, “SNMPv3 Traps and Informs”
A SNMP trap is an unsolicited message sent from the managed node to the management server, it is a
single transaction and because of that it does not try to perform a SNMPv3 information discovery to
obtain the management server’s Engine ID, Boot Count or engine time. As a result, when sending a
SNMPv3 trap, the device uses its own values. For NNMi to be able to process a SNMPv3 trap, the node
sending the trap needs to have been discovered by NNMi as a SNMPv3 device, this way, NNMi will have
cached the device’s Engine Time, Engine ID and Boot Count and NNMi will also know the managed node’s
user and protocol configuration. NNMi will use this information to process the incoming trap. Without the
information NNMi will be unable to process the trap.
The User and Protocol configuration information in the trap must match what has been configured in NNMi
for the device, otherwise NNMi will be unable to process the trap (i.e won’t be able to decrypt the
information).
SNMPv3 Informs
The following has been taken from the NNMi 10.00 Deployment Reference
An inform is an acknowledged packet, so this is more like an SNMP request that NNMi would make
to the device except, this time, it is the device initiating the first packet and NNMi responding with the
acknowledgment. The device, therefore, performs the discovery to NNMi to learn NNMi’s Engine ID,
boot count and engine time. The user name and protocol configuration that the device uses must
match what is configured in the NNMi trap forwarding configuration—this is, in effect, NNMi’s
SNMPv3 agent configuration
NNMi 10.00 Deployment Reference, page 50, “SNMPv3 Traps and Informs”
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
P a g e | 30
The SNMPv3 Inform, as opposed to a trap, does perform a SNMP discovery. The process will be similar to
the one described on this document under the “SNMPv3 Discovery” section. On this scenario, the device is
initiating the connection and it will be responsible to perform the SNMPv3 information discovery (Engine
Time, Engine ID, Boot Count). To be able to communicate with NNMi, the managed device will have to
know the NNMi User and Configuration Protocols. Just like NNMi needs to know the same information
when initiating communication with a managed v3 device.
The device needs to be configured to use the NNMi’s user and protocol information. The NNMi user and
protocol information can be found by accessing the following configuration page in the NNMI Web
Console:
Configuration > Incidents > Trap Server > Trap Forwarding Configuration
By default, the username is “NNMi” and the protocol information is not configured as seen below
After defining the Authentication and Privacy settings in NNMI, configure the remote device sending the
SNMPv3 informs to use these settings as well.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.