2.3. The Structure of Management InformationSo far, we have used the term "management information" to refer to the operational parameters of SNMP-capable devices. However, we've said very little about what management information actually contains or how it is represented. The first step toward understanding what kind of information a device can provide is to understand how this data itself is represented within the context of SNMP. The Structure of Management Information Version 1(SMIv1, RFC 1155) does exactly that: it defines precisely how managed objects[7] are named and specifies their associated datatypes. The Structure of Management Information Version 2 (SMIv2, RFC 2578) provides enhancements for SNMPv2. We'll start by discussing SMIv1 and will discuss SMIv2 in the next section.[7]For the remainder of this book "management information" will be referred to as "managed objects." Similarly, a single piece of management information (such as the operational status of a router interface) will be known as a "managed object."The definition of managed objects can be broken down into three attributes:
2.3.1. Naming OIDsManaged objects are organized into a tree-like hierarchy. This structure is the basis for SNMP's naming scheme. An object ID is made up of a series of integers based on the nodes in the tree, separated by dots (.). Although there's a human-readable form that's more friendly than a string of numbers, this form is nothing more than a series of names separated by dots, each of which represents a node of the tree. So you can use the numbers themselves, or you can use a sequence of names that represent the numbers. Figure 2-2 shows the top few levels of this tree. (We have intentionally left out some branches of the tree that don't concern us here.)![]() Figure 2-2. SMI object treeIn the object tree, the node at the top of the tree is called the root, anything with children is called a subtree, and anything without children is called a leaf node. For example, Figure 2-2's root, the starting point for the tree, is called "Root-Node." Its subtree is made up of ccitt(0), iso(1), and joint(2). In this illustration, iso(1) is the only node that contains a subtree; the other two nodes are both leaf nodes. ccitt(0) and joint(2) do not pertain to SNMP, so they will not be discussed in this book.[8][8]The ccitt subtree is administered by the International Telegraph and Telephone Consultative Committee (CCITT); the joint subtree is administered jointly by the International Organization for Standardization (ISO) and CCITT. As we said, neither branch has anything to do with SNMP.For the remainder of this book we will focus on the iso(1).org(3).dod(6 ).internet(1) subtree,[9] which is represented in OID form as 1.3.6.1 or as iso.org.dod.internet. Each managed object has a numerical OID and an associated textual name. The dotted-decimal notation is how a managed object is represented internally within an agent; the textual name, like an IP domain name, saves humans from having to remember long, tedious strings of integers. [9]Note that the term "branch" is sometimes used interchangeably with "subtree."The directory branch currently is not used. The management branch, or mgmt, defines a standard set of Internet management objects. The experimental branch is reserved for testing and research purposes. Objects under the private branch are defined unilaterally, which means that individuals and organizations are responsible for defining the objects under this branch. Here is the definition of the internet subtree, as well as all four of its subtrees:
The first line declares internet as the OID
1.3.6.1, which is defined as a subtree of
iso.org.dod, or 1.3.6 (the
::= is a definition operator). The last four
declarations are similar, but they define the other branches that
belong to internet. For the
directory branch, the notation {
internet 1 } tells us that it is part of the
internet subtree, and that its OID is
1.3.6.1.1. The OID for mgmt
is 1.3.6.1.2, and so on.
There is currently one branch under the private
subtree. It's used to give hardware and software vendors the
ability to define their own private objects for any type of hardware
or software they want managed by SNMP. Its SMI definition is:
The Internet Assigned
Numbers Authority (IANA) currently manages all the private enterprise
number assignments for individuals, institutions, organizations,
companies, etc.[10] A list of
all the current private enterprise numbers can be obtained from
ftp://ftp.isi.edu/in-notes/iana/assignments/enterprise-numbers.
As an example, Cisco Systems's private enterprise number is 9,
so the base OID for its private object space is defined as
iso.org.dod.internet.private.enterprises.cisco,
or 1.3.6.1.4.1.9. Cisco is free to do as it
wishes with this private branch. It's typical for companies
such as Cisco that manufacture networking equipment to define their
own private enterprise objects. This allows for a richer set of
management information than can be gathered from the standard set of
managed objects defined under the mgmt branch.
[10]The term "private enterprise" will be used throughout this book to refer to the enterprises branch.Companies aren't the only ones who can register their own private enterprise numbers. Anyone can do so, and it's free. The web-based form for registering private enterprise numbers can be found at http://www.isi.edu/cgi-bin/iana/enterprise.pl. After you fill in the form, which asks for information such as your organization's name and contact information, your request should be approved in about a week. Why would you want to register your own number? When you become more conversant in SNMP, you'll find things you want to monitor that aren't covered by any MIB, public or private. With your own enterprise number, you can create your own private MIB that allows you to monitor exactly what you want. You'll need to be somewhat clever in extending your agents so that they can look up the information you want, but it's very doable. 2.3.2. Defining OIDsThe SYNTAX attribute provides for definitions of managed objects through a subset of ASN.1. SMIv1 defines several datatypes that are paramount to the management of networks and network devices. It's important to keep in mind that these datatypes are simply a way to define what kind of information a managed object can hold. The types we'll be discussing are similar to those that you'd find in a computer programming language like C. Table 2-1 lists the supported datatypes for SMIv1.Table 2-1. SMIv1 Datatypes
The goal of all these object types is to define managed objects. In Chapter 1, "What Is SNMP?", we said that a MIB is a logical grouping of managed objects as they pertain to a specific management task, vendor, etc. The MIB can be thought of as a specification that defines the managed objects a vendor or device supports. Cisco, for instance, has literally hundreds of MIBs defined for its vast product line. For example, its Catalyst device has a separate MIB from its 7000 series router. Both devices have different characteristics that require different management capabilities. Vendor-specific MIBs typically are distributed as human-readable text files that can be inspected (or even modified) with a standard text editor such as vi. TIP: Most modern NMS products maintain a compact form of all the MIBs that define the set of managed objects for all the different types of devices they're responsible for managing. NMS administrators will typically compile a vendor's MIB into a format the NMS can use. Once a MIB has been loaded or compiled, administrators can refer to managed objects using either the numeric or human-readable object ID.It's important to know how to read and understand MIB files. The following example is a stripped-down version of MIB-II (anything preceded by -- is a comment):
The
first line of this file defines the name of the MIB, in this case
RFC1213-MIB. (RFC 1213 is the RFC that defines
MIB-II; many of the MIBs we refer to are defined by RFCs). The format
of this definition is always the same. The IMPORTS
section of the MIB is sometimes referred to as the
linkage section. It allows you to import
datatypes and OIDs from other MIB files using the
IMPORTS clause. This MIB imports the following
items from RFC1155-SMI (RFC 1155 defines SMIv1,
which we discussed earlier in this chapter):
The
first managed object in our subset of the MIB-II definition is
ifTable, which represents a table of network
interfaces on a managed device (note that object names are defined
using mixed case, with the first letter in lowercase). Here is its
definition using ASN.1 notation:
The
SYNTAX of ifTable is
SEQUENCE OF
IfEntry. This means that
ifTable is a table containing the columns
defined in IfEntry. The object is
not-accessible, which means that there is no way
to query an agent for this object's value. Its status is
mandatory, which means an agent must implement
this object in order to comply with the MIB-II specification. The
DESCRIPTION describes what exactly this object is.
The unique OID is 1.3.6.1.2.1.2.2, or
iso.org.dod.internet.mgmt.interfaces.2.
Let's now look at the SEQUENCE definition
from the MIB file earlier in this section, which is used with the
SEQUENCE OF type in the
ifTable definition:
Note
that the name of the sequence (IfEntry) is
mixed-case, but the first letter is capitalized, unlike the object
definition for ifTable. This is how a sequence
name is defined. A sequence is simply a list of columnar objects and
their SMI datatypes, which defines a conceptual table. In this case,
we expect to find variables defined by ifIndex,
ifDescr, ifType, etc. This
table can contain any number of rows; it's up to the agent to
manage the rows that reside in the table. It is possible for an NMS
to add rows to a table. This operation is covered later, in Section 2.6.4, "The set Operation".
Now that we have
IfEntry to specify what we'll find in any
row of the table, we can look back to the definition of
ifEntry (the actual rows of the table) itself:
ifEntry
defines a particular row in the ifTable. Its
definition is almost identical to that of
ifTable, except we have introduced a new clause,
INDEX. The index is a unique key used to define a
single row in the ifTable. It's up to the
agent to make sure the index is unique within the context of the
table. If a router has six interfaces, ifTable
will have six rows in it. ifEntry's OID is
1.3.6.1.2.1.2.2.1, or
iso.org.dod.internet.mgmt.interfaces.ifTable.ifEntry.
The index for ifEntry is
ifIndex, which is defined as:
The
ifIndex object is read-only,
which means we can see its value, but we cannot change it. The final
object our MIB defines is ifDescr, which is a
textual description for the interface represented by that particular
row in the ifTable. Our MIB example ends with
the END clause, which marks the end of the MIB. In
the actual MIB-II files, each object listed in the
IfEntry sequence has its own object definition.
In this version of the MIB we list only two of them, in the interest
of conserving space.
Copyright © 2002 O'Reilly & Associates. All rights reserved. | ||||||||||||||||||||||||||
|
|