Browse Prior Art Database

SNMP Applications (RFC2573)

IP.com Disclosure Number: IPCOM000003160D
Original Publication Date: 1999-Apr-01
Included in the Prior Art Database: 2000-Sep-13

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

D. Levi: AUTHOR [+3]

Abstract

This memo describes five types of SNMP applications which make use of an SNMP engine as described in [RFC2571]. The types of application described are Command Generators, Command Responders, Notification Originators, Notification Receivers, and Proxy Forwarders.

This text was extracted from a ASCII Text document.
This is the abbreviated version, containing approximately 2% of the total text.

Network Working Group D. Levi

Request for Comments: 2573 SNMP Research, Inc.

Obsoletes: 2273 P. Meyer

Category: Standards Track Secure Computing Corporation

B. Stewart

Cisco Systems

April 1999

SNMP Applications

Status of this Memo

This document specifies an Internet standards track protocol for the

Internet community, and requests discussion and suggestions for

improvements. Please refer to the current edition of the "Internet

Official Protocol Standards" (STD 1) for the standardization state

and status of this protocol. Distribution of this memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (1999). All Rights Reserved.

Abstract

This memo describes five types of SNMP applications which make use of

an SNMP engine as described in [RFC2571]. The types of application

described are Command Generators, Command Responders, Notification

Originators, Notification Receivers, and Proxy Forwarders.

This memo also defines MIB modules for specifying targets of

management operations, for notification filtering, and for proxy

forwarding.

Table Of Contents

1 Overview ..................................................... 2

1.1 Command Generator Applications ............................. 3

1.2 Command Responder Applications ............................. 3

1.3 Notification Originator Applications ....................... 3

1.4 Notification Receiver Applications ......................... 3

1.5 Proxy Forwarder Applications ............................... 4

2 Management Targets ........................................... 5

3 Elements Of Procedure ........................................ 6

3.1 Command Generator Applications ............................. 6

3.2 Command Responder Applications ............................. 9

3.3 Notification Originator Applications ....................... 14

3.4 Notification Receiver Applications ......................... 17

3.5 Proxy Forwarder Applications ............................... 19

3.5.1 Request Forwarding ....................................... 20

3.5.1.1 Processing an Incoming Request ......................... 20

3.5.1.2 Processing an Incoming Response ........................ 23

3.5.1.3 Processing an Incoming Internal-Class PDU .............. 24

3.5.2 Notification Forwarding .................................. 25

4 The Structure of the MIB Modules ............................. 28

4.1 The Management Target MIB Module ........................... 28

4.1.1 Tag Lists ................................................ 29

4.1.2 Definitions ................................