Understanding SNMP, Including SNMPv3
Overview
To manage communication systems and networks, a rich set of tools and applications are available. These tools use the SNMP (Simple Network Management Protocol) and the related RMON (Remote Monitoring) specification to exchange information with the different network components.
The course provides an in-depth coverage of the SNMP and RMON management framework. Concepts of MIB (Management Information Base) and SMI (Structure of Management Information) are explained. A detailed study of the numerous security features of SNMPv3 is presented, including the VACM (View-based Access Control Model) and USM (User-based Security Model).
What can yo…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Overview
To manage communication systems and networks, a rich set of tools and applications are available. These tools use the SNMP (Simple Network Management Protocol) and the related RMON (Remote Monitoring) specification to exchange information with the different network components.
The course provides an in-depth coverage of the SNMP and RMON management framework. Concepts of MIB (Management Information Base) and SMI (Structure of Management Information) are explained. A detailed study of the numerous security features of SNMPv3 is presented, including the VACM (View-based Access Control Model) and USM (User-based Security Model).
What can you expect?
- Understand the structure of the Management Information Base.
- Being able to use SNMP to manage and monitor the different network components.
- Fully understand the security aspects and configuration of SNMPv3.
Content
PART 1: INTRODUCTION
- Overview of the SNMP management system.
PART 2: THE MANAGEMENT INFORMATION BASE (MIB)
- MIB hierarchy, OIDs, indexing.
PART 3: THE STRUCTURE OF MANAGEMENT INFORMATION (SMI)
- ASN.1, SMIv1, SMIv2, encoding rules.
PART 4: SNMPV1, V2 AND RMON
- SNMP commands, message format, community string, traps.
PART 5: SNMPV3
- Security threats, view-based access model, user-based security model, overview of key-establishment mechanisms.
PART 6: USAGE EXAMPLE
- Case studies of specific MIBs on a router.
Prerequisites
Basic understanding of IP.
1 and 2 €600.00 3 to 6 €540.00 7 and up €480.00There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
