ON THIS PAGE
Optimizing the Network Management System Configuration for the Best Results
Configuring Options on Managed Devices for Better SNMP Response Time
Configuring the System Location for a Device Running Junos OS
Configuring the System Description on a Device Running Junos OS
Configuring SNMP Trap Options and Groups on a Device Running Junos OS
Configuring the Interfaces on Which SNMP Requests Can Be Accepted
Filtering Interface Information Out of SNMP Get and GetNext Output
Using the Enterprise-Specific Utility MIB to Enhance SNMP Coverage
Configuring Basic SNMP
Configuration Statements at the [edit snmp] Hierarchy Level
This topic shows all possible configuration statements at the [edit snmp]
hierarchy level and their level in the configuration
hierarchy. When you are configuring Junos OS, your current hierarchy
level is shown in the banner on the line preceding the user@host#
prompt.
[edit] snmp { alarm-management { alarm-list-name list-name { alarm-id id { alarm-state state { description alarm-description; notification-id notification-id-of-alarm; resource-prefix alarm-resource-prefix; varbind-index varbind-index-in-alarm-varbind-list; varbind-subtree alarm-varbind-subtree; varbind-value alarm-varbind-value; } } } } client-list client-list-name { ip-addresses; } community community-name { authorization authorization; client-list-name client-list-name; clients { address <restrict>; } logical-system logical-system-name { routing-instance routing-instance-name; clients { address <restrict>; } } routing-instance routing-instance-name { clients { address <restrict>; } } view view-name; } contact contact; description description; engine-id { (local engine-id | use-default-ip-address | use-mac-address); } filter-duplicates; interface [ interface-names ]; location location; name name; nonvolatile { commit-delay seconds; } rmon { alarm index { description description; falling-event-index index; falling-threshold integer; falling-threshold-interval seconds; interval seconds; request-type (get-next-request | get-request | walk-request); rising-event-index index; rising-threshold integer; sample-type type; startup-alarm alarm; syslog-subtag syslog-subtag; variable oid-variable; } event index { community community-name; description description; type type; } } traceoptions { file filename <files number> <size size> <world-readable | no-world-readable> <match regular-expression>; flag flag; memory-trace; no-remote-trace; no-default-memory-trace; } trap-group group-name { categories { category; } destination-port port-number; routing-instance instance; logical-system logical-system-name; targets { address; } version (all | v1 | v2); } trap-options { agent-address outgoing-interface; source-address address; enterprise-oid; logical-system logical-system-name { routing-instance routing-instance-name { source-address address; } } routing-instance routing-instance-name { source-address address; } } v3 { notify name { tag tag-name; type (trap | inform); } notify-filter profile-name { oid oid (include | exclude); } snmp-community community-index { community-name community-name; security-name security-name; tag tag-name; } target-address target-address-name { address address; address-mask address-mask; logical-system logical-system; port port-number; retry-count number; routing-instance instance; tag-list tag-list; target-parameters target-parameters-name; timeout seconds; } target-parameters target-parameters-name { notify-filter profile-name; parameters { message-processing-model (v1 | v2c | v3); security-level (authentication | none | privacy); security-model (usm | v1 | v2c); security-name security-name; } } usm { local-engine { user username { authentication-md5 { authentication-password authentication-password; } authentication-none; authentication-sha { authentication-password authentication-password; } privacy-3des { privacy-password privacy-password; } privacy-aes128 { privacy-password privacy-password; } privacy-des { privacy-password privacy-password; } privacy-none; } } } vacm { access { group group-name { (default-context-prefix | context-prefix context-prefiix){ security-model (any | usm | v1 | v2c) { security-level (authentication | none | privacy) { notify-view view-name; read-view view-name; write-view view-name; } } } } } security-to-group { security-model (usm | v1 | v2c) { security-name security-name { group group-name; } } } } } view view-name { oid object-identifier (include | exclude); } }
Configuring SNMP
SNMP is implemented in the Junos OS Software running
on the QFX Series and OCX Series products. By default, SNMP is not
enabled. To enable SNMP, you must include the SNMP configuration statements
at the [edit]
hierarchy level.
To configure the minimum requirements for SNMP,
include the following statements at the [edit]
hierarchy
level of the configuration:
[edit] snmp { community public; }
To configure complete SNMP features, include the
following statements at the [edit]
hierarchy level of the
configuration:
snmp { client-list client-list-name { ip-addresses; } community community-name { authorization authorization; client-list-name client-list-name; clients { address restrict; } logical-system logical-system-name { routing-instance routing-instance-name { clients { addresses; } } } routing-instance routing-instance-name { clients { addresses; } } view view-name; } contact contact; description description; filter-duplicates; filter-interfaces; health-monitor { falling-threshold integer; interval seconds; rising-threshold integer; } interface [ interface-names ]; location location; name name; nonvolatile { commit-delay seconds; } rmon { alarm index { description description; falling-event-index index; falling-threshold integer; falling-threshold-interval seconds; interval seconds; request-type; rising-event-index index; rising-threshold integer; sample-type (absolute-value | delta-value); startup-alarm (falling-alarm | rising-alarm | rising-or-falling alarm); syslog-subtag syslog-subtag; variable oid-variable; } event index { community community-name; description description; type type; } history history-index { bucket-size number; interface interface-name; interval seconds; owner owner-name; } } traceoptions { file filename <files number> <size size> <world-readable | no-world-readable> <match regular-expression>; flag flag; } trap-group group-name { categories { category; } destination-port port-number; routing-instance routing-instance-name; targets { address; } version (all | v1 | v2); } trap-options { agent-address outgoing-interface; source-address address; } v3 { notify name { tag tag-name; type trap; } notify-filter profile-name { oid object-identifier (include | exclude); } snmp-community community-index { community-name community-name; security-name security-name; tag tag-name; } target-address target-address-name { address address; address-mask address-mask; logical-system logical-system; port port-number; retry-count number; routing-instance routing-instance-name; tag-list tag-list; target-parameters target-parameters-name; timeout seconds; } target-parameters target-parameters-name { notify-filter profile-name; parameters { message-processing-model (v1 | v2c | V3); security-level (authentication | none | privacy); security-model (usm | v1 | v2c); security-name security-name; } } usm { local-engine { user username { authentication-sha { authentication-password authentication-password; } authentication-md5 { authentication-password authentication-password; } authentication-none; privacy-aes128 { privacy-password privacy-password; } privacy-des { privacy-password privacy-password; } privacy-3des { privacy-password privacy-password; } privacy-none; } } remote-engine engine-id { user username { authentication-sha { authentication-password authentication-password; } authentication-md5 { authentication-password authentication-password; } authentication-none; privacy-aes128 { privacy-password privacy-password; } privacy-des { privacy-password privacy-password; } privacy-3des { privacy-password privacy-password; } privacy-none { privacy-password privacy-password; } } } } vacm { access { group group-name { (default-context-prefix | context-prefix context-prefix) { security-model (any | usm | v1 | v2c) { security-level (authentication | none | privacy) { notify-view view-name; read-view view-name; write-view view-name; } } } } } security-to-group { security-model (usm | v1 | v2c) { security-name security-name { group group-name; } } } } } view view-name { oid object-identifier (include | exclude); } }
See Also
Optimizing the Network Management System Configuration for the Best Results
You can modify your network management system configuration to optimize the response time for SNMP queries. The following sections contain a few tips on how you can configure the network management system:
- Changing the Polling Method from Column-by-Column to Row-by-Row
- Reducing the Number of Variable Bindings per PDU
- snmp bulk-get recommended number of OIDs and max-repititions
- Increasing Timeout Values in Polling and Discovery Intervals
- Reducing Incoming Packet Rate at the snmpd
Changing the Polling Method from Column-by-Column to Row-by-Row
You can configure the network management system to use the row-by-row method for SNMP data polling. It has been proven that the row-by-row and multiple row-by-multiple-row polling methods are more efficient than column-by-column polling. By configuring the network management system to use the row-by-row data polling method, you can ensure that data for only one interface is polled in a request instead of a single request polling data for multiple interfaces, as is the case with column-by-column polling. Row-by-row polling also reduces the risk of requests timing out.
Reducing the Number of Variable Bindings per PDU
By reducing the number of variable bindings per protocol data unit (PDU), you can improve the response time for SNMP requests. A request that polls for data related to multiple objects, which are mapped to different index entries, translates into multiple requests at the device-end because the subagent might have to poll different modules to obtain data that are linked to different index entries. The recommended method is to ensure that a request has only objects that are linked to one index entry instead of multiple objects linked to different index entries.
If responses from a device are slow, avoid using the GetBulk
option for the device, because a GetBulk
request might contain objects that are linked to various index entries
and might further increase the response time.
snmp bulk-get recommended number of OIDs and max-repititions
Generally an SNMP bulk-get request responds with a total of (max-repetitions * number-of-OIDs) variable bindings. When interface statistics objects (such as ifInOctets, ifOutOctets, etc) are present in a query, the requests are sent to lower layers. Hence these responses are impacted by an increase in the ‘max-repetitions’ that you send in a bulk-get request. For bulk-get queries, for interface stats objects it is recommended to use ‘max-repetitions’ value of 10 and maximum number of OIDs per request is 10.
Increasing Timeout Values in Polling and Discovery Intervals
By increasing the timeout values for polling and discovery intervals, you can increase the queuing time at the device end and reduce the number of throttle drops that occur because of the request timing out.
Reducing Incoming Packet Rate at the snmpd
By reducing the frequency of sending SNMP requests to a device,
you can reduce the risk of SNMP requests piling up at any particular
device. Apart from reducing the frequency of sending SNMP requests
to a device, you can also increase the polling interval, control the
use of GetNext
requests, and reduce the number of polling
stations per device.
Configuring Options on Managed Devices for Better SNMP Response Time
The following sections contain information about configuration options on the managed devices that can enhance SNMP performance:
- Enabling the stats-cache-lifetime Option
- Filtering Out Duplicate SNMP Requests
- Excluding Interfaces That Are Slow in Responding to SNMP Queries
Enabling the stats-cache-lifetime Option
Junos OS provides you with an option to configure the length of time (in seconds)
the interface stats is cached. If the NMS queries again for the same interface
within the cache time, the same data is returned. If the NMS queries after the
cache time, the cache is no more valid and a fresh data is fetched from the
lower layers and the cache timestamp is updated. Default
stats-cache-lifetime
is 5 seconds. This can be tuned as per
the polling frequency.
Reducing the value of the stats-cache-lifetime option results in more queries and can impact performance. To get the live uncached statistics, set the value of the stats-cache-lifetime option to 0. However, this is not recommended since it completely disables the caching feature and impacts performance.
Filtering Out Duplicate SNMP Requests
If a network management station retransmits a Get
, GetNext
, or GetBulk
SNMP request too frequently
to a device, that request might interfere with the processing of previous
requests and slow down the response time of the agent. Filtering these
duplicate requests improves the response time of the SNMP agent. The
Junos OS enables you to filter out duplicate Get
, GetNext
, and GetBulk
SNMP requests. The Junos OS
uses the following information to determine if an SNMP request is
a duplicate:
Source IP address of the SNMP request
Source UDP port of the SNMP request
Request ID of the SNMP request
By default, filtering of duplicate SNMP requests is disabled on devices running the Junos OS.
To enable filtering of duplicate SNMP requests on devices
running the Junos OS, include the filter-duplicates
statement
at the [edit snmp]
hierarchy level:
[edit snmp] filter-duplicates;
Excluding Interfaces That Are Slow in Responding to SNMP Queries
An interface that is slow in responding to SNMP requests for
interface statistics can delay kernel responses to SNMP requests.
You can review the mib2d log file to find out how long the kernel
takes to respond to various SNMP requests. For more information about
reviewing the log file for kernel response data, see “Checking
Kernel and Packet Forwarding Engine Response” under Monitoring SNMP Activity and Tracking Problems That
Affect SNMP Performance on a Device Running Junos OS.
If you notice that a particular interface is slow in responding, and
think that it is slowing down the kernel from responding to SNMP requests,
exclude that interface from the SNMP queries to the device. You can
exclude an interface from the SNMP queries either by configuring the filter-interface
statement or by modifying the SNMP view settings.
The following example shows a sample configuration for
excluding interfaces from the SNMP Get
, GetNext
, and Set
operations:
[edit] snmp { filter-interfaces { interfaces { # exclude the specified interfaces interface1; interface2; } all-internal-interfaces; # exclude all internal interfaces } }
The following example shows the SNMP view configuration for excluding the interface with an interface index (ifIndex) value of 312 from a request for information related to the ifTable and ifXtable objects:
[edit snmp] view test { oid .1 include; oid ifTable.1.*.312 exclude; oid ifXTable.1.*.312 exclude }
Alternatively, you can take the interface that is slow in responding offline.
Best Practices for Configuring SNMP
The following sections contain information about basic SNMP configuration and a few examples of configuring the basic SNMP operations on devices running Junos OS:
- Configuring Basic Settings for SNMPv1 and SNMPv2
- Configuring Basic Settings for SNMPv3
- Configuring System Name, Location, Description, and Contact Information
Configuring Basic Settings for SNMPv1 and SNMPv2
By default, SNMP is not enabled on devices running Junos OS.
To enable SNMP on devices running Junos OS, include the community
public
statement at the [edit snmp]
hierarchy
level.
Enabling SNMPv1 and SNMPv2 Get and GetNext Operations
[edit] snmp { community public; }
A community that is defined as public grants access to all MIB data to any client.
To enable SNMPv1 and SNMPv2 Set
operations on the
device, you must include the following statements at the [edit
snmp]
hierarchy level:
Enabling SNMPv1 and SNMPv2 Set Operations
[edit snmp] view all { oid .1; } community private { view all; authorization read-write; }
The following example shows the basic minimum configuration for SNMPv1 and SNMPv2 traps on a device:
Configuring SNMPv1 and SNMPv2 Traps
[edit snmp] trap-group jnpr { targets { 192.168.69.179; } }
Configuring Basic Settings for SNMPv3
The following example shows the minimum SNMPv3 configuration
for enabling Get
, GetNext
, and Set
operations on a device (note that the configuration has authentication
set to md5
and privacy to none
):
Enabling SNMPv3 Get, GetNext, and Set Operations
[edit snmp] v3 { usm { local-engine { user jnpruser { authentication-md5 { authentication-key "$9$guaDiQFnAuOQzevMWx7ikqP"; ## SECRET-DATA } privacy-none; } } } vacm { security-to-group { security-model usm { security-name jnpruser { group grpnm; } } } access { group grpnm { default-context-prefix { security-model any { security-level authentication { read-view all; write-view all; } } } } } } } view all { oid .1; }
The following example shows the basic configuration for SNMPv3
informs on a device (the configuration has authentication and privacy
set to none
):
Configuring SNMPv3 Informs
[edit snmp] v3 { usm { remote-engine 00000063200133a2c0a845c3 { user RU2_v3_sha_none { authentication-none; privacy-none; } } } vacm { security-to-group { security-model usm { security-name RU2_v3_sha_none { group g1_usm_auth; } } } access { group g1_usm_auth { default-context-prefix { security-model usm { security-level authentication { read-view all; write-view all; notify-view all; } } } } } } target-address TA2_v3_sha_none { address 192.168.69.179; tag-list tl1; address-mask 255.255.252.0; target-parameters TP2_v3_sha_none; } target-parameters TP2_v3_sha_none { parameters { message-processing-model v3; security-model usm; security-level none; security-name RU2_v3_sha_none; } notify-filter nf1; } notify N1_all_tl1_informs { type inform; # Replace inform with trap to convert informs to traps. tag tl1; } notify-filter nf1 { oid .1 include; } } view all { oid .1 include; }
You can convert the SNMPv3 informs to traps by setting the value
of the type
statement at the [edit snmp v3 notify
N1_all_tl1_informs]
hierarchy level to trap
as shown
in the following example:
Converting Informs to Traps
user@host# set snmp v3 notify N1_all_tl1_informs type trap
Configuring System Name, Location, Description, and Contact Information
Junos OS enables you to include the name and location of the system, administrative contact information, and a brief description of the system in the SNMP configuration.
Always keep the name, location, contact, and description information configured and updated for all your devices that are managed by SNMP.
The following example shows a typical configuration.
Use quotation marks to enclose the system name, contact, location, and description information that contain spaces.
[edit] snmp { name “snmp 001”; # Overrides the system name. contact “Juniper Berry, (650) 555 1234”; # Specifies the name and phone number of the administrator. location “row 11, rack C”; # Specifies the location of the device. description “M40 router with 8 FPCs” # Configures a description for the device. }
Configuring SNMP on a Device Running Junos OS
By default, SNMP is disabled on devices running Junos OS. To
enable SNMP on a router or switch, you must include the SNMP configuration
statements at the [edit snmp]
hierarchy level.
To configure the minimum requirements for SNMP, include
the following statements at the [edit snmp]
hierarchy level
of the configuration:
[edit] snmp { community public; }
The community defined here as public
grants read
access to all MIB data to any client.
To configure complete SNMP features, include the following
statements at the [edit snmp]
hierarchy level:
snmp { client-list client-list-name { ip-addresses; } community community-name { authorization authorization; client-list-name client-list-name; clients { address restrict; } routing-instance routing-instance-name { clients { addresses; } } logical-system logical-system-name { routing-instance routing-instance-name { clients { addresses; } } } view view-name; } contact contact; description description; engine-id { (local engine-id | use-mac-address | use-default-ip-address); } filter-duplicates; health-monitor { falling-threshold integer; interval seconds; rising-threshold integer; } interface [ interface-names ]; location location; name name; nonvolatile { commit-delay seconds; } rmon { alarm index { description text-description; falling-event-index index; falling-threshold integer; falling-threshold-interval seconds; interval seconds; request-type (get-next-request | get-request | walk-request); rising-event-index index; sample-type type; startup-alarm alarm; syslog-subtag syslog-subtag; variable oid-variable; } event index { community community-name; description text-description; type type; } } traceoptions { file filename <files number> <size size> <world-readable | no-world-readable> <match regular-expression>; flag flag; } trap-group group-name { categories { category; } destination-port port-number; routing-instance instance; targets { address; } version (all | v1 | v2); } trap-options { agent-address outgoing-interface; source-address address; } view view-name { oid object-identifier (include | exclude); } }
See Also
Configuring the System Contact on a Device Running Junos OS
You can specify an administrative contact for each system
being managed by SNMP. This name is placed into the MIB II sysContact
object. To configure a contact name, include the contact
statement at the [edit snmp]
hierarchy level:
[edit snmp] contact contact;
If the name contains spaces, enclose it in quotation marks (" ").
To define a system contact name that contains spaces:
[edit] snmp { contact "Juniper Berry, (650) 555-1234"; }
Configuring the System Location for a Device Running Junos OS
You can specify the location of each system being managed
by SNMP. This string is placed into the MIB II sysLocation object.
To configure a system location, include the location
statement
at the [edit snmp]
hierarchy level:
[edit snmp] location location;
If the location contains spaces, enclose it in quotation marks (" ").
To specify the system location:
[edit] snmp { location "Row 11, Rack C"; }
Configuring the System Description on a Device Running Junos OS
You can specify a description for each system being managed
by SNMP. This string is placed into the MIB II sysDescription object.
To configure a description, include the description
statement
at the [edit snmp]
hierarchy level:
[edit snmp] description description;
If the description contains spaces, enclose it in quotation marks (" ").
To specify the system description:
[edit] snmp { description "M40 router with 8 FPCs"; }
Configuring SNMP Details
You can use SNMP to store basic administrative details, such as a contact name and the location of the device. Your management system can then retrieve this information remotely, when you are troubleshooting an issue or performing an audit. In SNMP terminology, these are the sysContact, sysDescription, and sysLocation objects found within the system group of MIB-2 (as defined in RFC 1213, Management Information Base for Network Management of TCP/IP-based internets: MIB-II). You can set initial values directly in the Junos OS configuration for each system being managed by SNMP.
To set the system contact details:
Configuring a Different System Name
Junos OS enables you to override the system name by including
the name
statement at the [edit snmp]
hierarchy
level:
[edit snmp] name name;
If the name contains spaces, enclose it in quotation marks (" ").
To specify the system name override:
[edit] snmp { name "snmp 1"; }
Configuring the Commit Delay Timer
When a router or switch first receives an SNMP nonvolatile Set
request, a Junos OS XML protocol session opens
and prevents other users or applications from changing the candidate
configuration (equivalent to the command-line interface [CLI] configure exclusive
command). If the router does not receive
new SNMP Set
requests within 5 seconds
(the default value), the candidate configuration is committed and
the Junos OS XML protocol session closes (the configuration lock is
released). If the router receives new SNMP Set
requests while the candidate configuration is being committed, the
SNMP Set
request is rejected and an error
is generated. If the router receives new SNMP Set
requests before 5 seconds have elapsed, the commit-delay timer (the
length of time between when the last SNMP request is received and
the commit is requested) resets to 5 seconds.
By default, the timer is set to 5 seconds. To configure
the timer for the SNMP Set
reply and start
of the commit, include the commit-delay
statement at the [edit snmp nonvolatile]
hierarchy level:
[edit snmp nonvolatile] commit-delay seconds;
seconds
is the length of the
time between when the SNMP request is received and the commit is requested
for the candidate configuration. For more information about the configure exclusive
command and locking the configuration,
see the Junos OS CLI User Guide .
Filtering Duplicate SNMP Requests
By default, filtering duplicate get
, getNext
, and getBulk
SNMP requests is disabled on devices running Junos OS. If a network
management station retransmits a Get
, GetNext
, or GetBulk
SNMP
request too frequently to the router, that request might interfere
with the processing of previous requests and slow down the response
time of the agent. Filtering these duplicate requests improves the
response time of the SNMP agent. Junos OS uses the following information
to determine if an SNMP request is a duplicate:
Source IP address of the SNMP request
Source UDP port of the SNMP request
Request ID of the SNMP request
To filter duplicate SNMP requests, include the filter-duplicates
statement at the [edit snmp]
hierarchy level:
[edit snmp] filter-duplicates;
Configuring SNMP Communities
Configuring the SNMP agent in Junos OS is a straightforward task that shares many familiar settings common to other managed devices in your network. For example, you need to configure Junos OS with an SNMP community string and a destination for traps. Community strings are administrative names that group collections of devices and the agents that are running on them together into common management domains. If a manager and an agent share the same community, they can communicate with each other. An SNMP community defines the level of authorization granted to its members, such as which MIB objects are available, which operations (read-only or read-write) are valid for those objects, and which SNMP clients are authorized, based on their source IP addresses.
The SNMP community string defines the relationship between an SNMP server system and the client systems. This string acts like a password to control the clients’ access to the server.
To create a read-only SNMP community:
To create a read-write SNMP community:
Enter the SNMP community used in your network.
[edit groups global] user@host# set snmp community name
This example standard community string
private
to identify the community granted read-write access to the SNMP agent running on the device.[edit groups global] user@host# set snmp community private
Define the authorization level for the community.
[edit groups global snmp community name] user@host# set authorization authorization
This example confines the public community to read-only access. Any SNMP client (for example, an SNMP management system) that belongs to the public community can read MIB variables but cannot set (change) them.
[edit groups global snmp community public] user@host# set authorization read-write
Define a list of clients in the community who are authorized to make changes to the SNMP agent in Junos OS.
List the clients by IP address and prefix.
[edit groups global snmp community name] user@host# set clients address
For example:
[edit groups global snmp community private] user@host# set clients 192.168.1.15/24 user@host# set clients 192.168.1.18/24
Define the clients that are not authorized within the community by specifying their IP address, followed by the
restrict
statement.[edit groups global snmp community name] user@host# set clients address resrict
The following statement defines all other hosts as being restricted from the public community.
[edit groups global snmp community private] user@host# set clients 0/0 restrict
At the top level of the configuration, apply the configuration group.
If you use a configuration group, you must apply it for it to take effect.
[edit] user@host# set apply-groups global
Commit the configuration.
user@host# commit
Configuring the SNMP Community String
The SNMP community string defines the relationship between an
SNMP server system and the client systems. This string acts like a
password to control the clients’ access to the server. To configure
a community string in a Junos OS configuration, include the community
statement at the [edit snmp]
hierarchy level:
[edit snmp] community name { authorization authorization; clients { default restrict; address restrict; } viewview-name; }
If the community name contains spaces, enclose it in quotation marks (" ").
The default authorization level for a community is read-only
. To allow Set
requests
within a community, you need to define that community as authorization read-write
. For Set
requests, you also need to include the specific MIB objects that
are accessible with read-write privileges using the view
statement. The default view includes all supported MIB objects that
are accessible with read-only privileges; no MIB objects are accessible
with read-write privileges. For more information about the view
statement, see Configuring MIB Views.
The clients
statement lists the IP addresses of the
clients (community members) that are allowed to use this community.
If no clients
statement is present, all clients are allowed.
For address
, you must specify an IPv4
address, not a hostname. Include the default restrict
option
to deny access to all SNMP clients for which access is not explicitly
granted. We recommend that you always include the default restrict
option to limit SNMP client access to the local switch.
Community names must be unique within each SNMP system.
Examples: Configuring the SNMP Community String
Grant read-only access to all clients. With the following
configuration, the system responds to SNMP Get
, GetNext
, and GetBulk
requests that contain the community string public
:
[edit] snmp { community public { authorization read-only; } }
Grant all clients read-write access to the ping MIB and jnxPingMIB
. With the following configuration, the system responds
to SNMP Get
, GetNext
, GetBulk
, and Set
requests that contain the community string private
and specify an OID contained in the ping MIB or jnxPingMIB
hierarchy:
[edit] snmp { view ping-mib-view { oid pingMIB include; oid jnxPingMIB include; community private { authorization read-write; view ping-mib-view; } } }
The following configuration allows read-only access to
clients with IP addresses in the range 1.2.3.4/24
,
and denies access to systems in the range fe80::1:2:3:4/64
:
[edit] snmp { community field-service { authorization read-only; clients { default restrict; # Restrict access to all SNMP clients not explicitly # listed on the following lines. 1.2.3.4/24; # Allow access by all clients in 1.2.3.4/24 except fe80::1:2:3:4/64 restrict;# fe80::1:2:3:4/64. } } }
Adding a Group of Clients to an SNMP Community
Junos OS enables you to add one or more groups of clients to
an SNMP community. You can include the client-list-name name
statement at the [edit snmp community community-name]
hierarchy level to add all the members
of the client list or prefix list to an SNMP community.
To define a list of clients, include the client-list
statement followed by the IP addresses of the clients at the [edit snmp]
hierarchy level:
[edit snmp] client-list client-list-name { ip-addresses; }
You can configure a prefix list at the [edit policy options]
hierarchy level. Support for prefix lists in the SNMP community
configuration enables you to use a single list to configure the SNMP
and routing policies. For more information about the prefix-list
statement, see the Routing Policies, Firewall Filters, and Traffic Policers User Guide.
To add a client list or prefix list to an SNMP community,
include the client-list-name
statement at the [edit
snmp community community-name]
hierarchy
level:
[edit snmp community community-name] client-list-name client-list-name;
The client list and prefix list must not have the same name.
The following example shows how to define a client list:
[edit] snmp { client-list clentlist1 { 10.1.1.1/32; 10.2.2.2/32; } }
The following example shows how to add a client list to an SNMP community:
[edit] snmp { community community1 { authorization read-only; client-list-name clientlist1; } }
The following example shows how to add a prefix list to an SNMP community:
[edit] policy-options { prefix-list prefixlist { 10.3.3.3/32; 10.5.5.5/32; } } snmp { community community2 { client-list-name prefixlist; } }
See Also
Configuring a Proxy SNMP Agent
Starting with Release 12.3, Junos OS enables you to assign one of the devices in the network as a proxy SNMP agent through which the network management system (NMS) can query other devices in the network. When you configure a proxy, you can specify the names of devices to be managed through the proxy SNMP agent.
When the NMS queries the proxy SNMP agent, the NMS specifies the community name (for SNMPv1 and SNMPv2) or the context and security name (for SNMPv3) associated with the device from which it requires the information.
If you have configured authentication and privacy methods and passwords for SNMPv3, those parameters are also specified in the query for SNMPv3 information.
To configure a proxy SNMP agent and specify devices to
be managed by the proxy SNMP agent, you can include the following
configuration statements at the [edit snmp
] hierarchy level:
proxy proxy-name{ device-name device-name; logical-system logical-system { routing-instance routing-instance; } routing-instance routing-instance; <version-v1 | version-v2c> { snmp-community community-name; no-default-comm-to-v3-config; } version-v3 { security-name security-name; context context-name; } }
The
proxy
statement enables you to specify a unique name for the proxy configuration.The
version-v1
,version-v2c
, andversion-v3
statements enable you to specify the SNMP version.The
no-default-comm-to-v3-config
statement is an optional statement at the [edit snmp proxy proxy-name <version-v1 | version-v2c>
] hierarchy level that when included in the configuration requires you to manually configure the statements at the [edit snmp v3 snmp-community community-name
] and [edit snmp v3 vacm
] hierarchy levels.If the
no-default-comm-to-v3-config
statement is not included at the [edit snmp proxy proxy-name <version-v1 | version-v2c>
] hierarchy level, the [edit snmp v3 snmp-community community-name
] and [edit snmp v3 vacm
] hierarchy level configurations are automatically initialized.The
logical-system
androuting-instance
statements are optional statements that enable you to specify logical system and routing instance names if you want to create proxies for logical systems or routing instances on the device.
Starting with Junos OS Release 15.2, you must configure interface <interface-name>
statement
at the [edit snmp]
hierarchy level for the proxy SNMP agent.
The community and security configuration for the proxy should match the corresponding configuration on the device that is to be managed.
Because the proxy SNMP agent does not have trap forwarding capabilities, the devices that are managed by the proxy SNMP agent send the traps directly to the network management system.
You can use the show snmp proxy
operational mode
command to view proxy details on a device. The show snmp proxy
command returns the proxy names, device names, SNMP version, community/security,
and context information.
See Also
Configuring SNMP Traps
Traps are unsolicited messages sent from an SNMP agent to remote network management systems or trap receivers. Many enterprises use SNMP traps as part of a fault-monitoring solution, in addition to system logging. In Junos OS, SNMP traps are not forwarded by default, so you must configure a trap-group if you wish to use SNMP traps.
You can create and name a group of one or more types of SNMP traps and then define which systems receive the group of SNMP traps.. The name of the trap group is embedded in SNMP trap notification packets as one variable binding (varbind) known as the community name.
To configure an SNMP trap:
Configuring SNMP Trap Options and Groups on a Device Running Junos OS
Some carriers have more than one trap receiver that forwards traps to a central NMS. This allows for more than one path for SNMP traps from a router to the central NMS through different trap receivers. A device running Junos OS can be configured to send the same copy of each SNMP trap to every trap receiver configured in the trap group.
The source address in the IP header of each SNMP trap packet is set to the address of the outgoing interface by default. When a trap receiver forwards the packet to the central NMS, the source address is preserved. The central NMS, looking only at the source address of each SNMP trap packet, assumes that each SNMP trap came from a different source.
In reality, the SNMP traps came from the same router, but each left the router through a different outgoing interface.
The statements discussed in the following sections are provided to allow the NMS to recognize the duplicate traps and to distinguish SNMPv1 traps based on the outgoing interface.
To configure SNMP trap options and trap groups, include
the trap-options
and trap-group
statements at
the [edit snmp]
hierarchy level:
[edit snmp] trap-options { agent-address outgoing-interface; source-address address; } trap-group group-name { categories { category; } destination-port port-number; targets { address; } version (all | v1 | v2); }
Configuring SNMP Trap Options
Using SNMP trap options, you can set the source address of every SNMP trap packet sent by the router to a single address regardless of the outgoing interface. In addition, you can set the agent address of the SNMPv1 traps. For more information about the contents of SNMPv1 traps, see RFC 1157.
SNMP cannot be associated with any routing instances other than the master routing instance.
To configure SNMP trap options, include the trap-options
statement at the [edit snmp]
hierarchy level:
[edit snmp] trap-options { agent-address outgoing-interface; context-oid; enterprise-oid; logical-system logical-system-name { routing-instance routing-instance-name { source-address address; } } routing-instance routing-instance-name { source-address address; } }
You must also configure a trap group for the trap options to take effect. For information about trap groups, see Configuring SNMP Trap Groups.
This topic contains the following sections:
- Configuring the Source Address for SNMP Traps
- Configuring the Agent Address for SNMP Traps
- Adding snmpTrapEnterprise Object Identifier to Standard SNMP Traps
Configuring the Source Address for SNMP Traps
You can configure the source address of trap packets in many ways: lo0, a valid IPv4 address or IPv6 address configured on one of the router interfaces, a logical-system address, or the address of a routing-instance. The value lo0 indicates that the source address of the SNMP trap packets is set to the lowest loopback address configured on the interface lo0.
If the source address is an invalid IPv4 or IPv6 address or is not configured, SNMP traps are not generated.
You can configure the source address of trap packets in one of the following formats:
A valid IPv4 address configured on one of the router interfaces
A valid IPv6 address configured on one of the router interfaces
lo0
; that is, the lowest loopback address configured on the interface lo0A logical-system name
A routing-instance name
A Valid IPv4 Address As the Source Address
To specify a valid IPv4 interface address as the source
address for SNMP traps on one of the router interfaces, include the source-address
statement at the [edit snmp trap-options]
hierarchy level:
[edit snmp trap-options] source-address address;
address
is a valid IPv4 address
configured on one of the router interfaces.
A Valid IPv6 Address As the Source Address
To specify a valid IPv6 interface address as the source
address for SNMP traps on one of the router interfaces, include the source-address
statement at the [edit snmp trap-options]
hierarchy level:
[edit snmp trap-options] source-address address;
address
is a valid IPv6 address
configured on one of the router interfaces.
The Lowest Loopback Address As the Source Address
To specify the source address of the SNMP traps so that
they use the lowest loopback address configured on the interface lo0
as the source address, include the source-address
statement
at the [edit snmp trap-options]
hierarchy level:
[edit snmp trap-options] source-address lo0;
To enable and configure the loopback address, include
the address
statement at the [edit interfaces lo0
unit 0 family inet]
hierarchy level:
[edit interfaces] lo0 { unit 0 { family inet { address ip-address; } } }
To configure the loopback address as the source address of trap packets:
[edit snmp] trap-options { source-address lo0; } trap-group "urgent-dispatcher" { version v2; categories link startup; targets { 192.168.10.22; 172.17.1.2; } } [edit interfaces] lo0 { unit 0 { family inet { address 10.0.0.1/32; address 127.0.0.1/32; } } }
In this example, the IP address 10.0.0.1 is the source address of every trap sent from this router.
Logical System Name as the Source Address
To specify a logical system name as the source address
of SNMP traps, include the logical-system logical-system-name
statement at the [edit snmp trap-options]
hierarchy
level.
For example, the following configuration sets logical system
name ls1
as the source address of SNMP traps:
[edit snmp] trap-options{ logical-system ls1; }
Routing Instance Name as the Source Address
To specify a routing instance name as the source address
of SNMP traps, include the routing-instance routing-instance-name
statement at the [edit snmp trap-options]
hierarchy
level.
For example, the following configuration sets the routing instance
name ri1
as the source address for SNMP traps:
[edit snmp] trap-options { routing-instance ri1; }
Configuring the Agent Address for SNMP Traps
The agent address is only available in SNMPv1 trap packets
(see RFC 1157). By default, the router’s default local address
is not specified in the agent address field of the SNMPv1 trap. To
configure the agent address, include the agent-address
statement
at the [edit snmp trap-options]
hierarchy level. Currently,
the agent address can only be the address of the outgoing interface:
[edit snmp] trap-options { agent-address outgoing-interface; }
To configure the outgoing interface as the agent address:
[edit snmp] trap-options { agent-address outgoing-interface; } trap-group “ urgent-dispatcher” { version v1; categories link startup; targets { 192.168.10.22; 172.17.1.2; } }
In this example, each SNMPv1 trap packet sent has its agent address value set to the IP address of the outgoing interface.
Adding snmpTrapEnterprise Object Identifier to Standard SNMP Traps
The snmpTrapEnterprise object helps you identify the enterprise that has defined the trap. Typically, the snmpTrapEnterprise object appears as the last varbind in enterprise-specific SNMP version 2 traps. However, starting Release 10.0, Junos OS enables you to add the snmpTrapEnterprise object identifier to standard SNMP traps as well.
To add snmpTrapEnterprise to standard traps, include the enterprise-oid
statement at the [edit snmp trap-options]
hierarchy level. If the enterprise-oid
statement is not
included in the configuration, snmpTrapEnterprise is added only for
enterprise-specific traps.
[edit snmp] trap-options { enterprise-oid; }
Configuring SNMP Trap Groups
You can create and name a group of one or more types
of SNMP traps and then define which systems receive the group of
SNMP traps. The trap group must be configured for SNMP traps to
be sent. To create an SNMP trap group, include the trap-group
statement at the [edit snmp]
hierarchy level:
[edit snmp] trap-group group-name { categories { category; } destination-port port-number; routing-instance instance; targets { address; } version (all | v1 | v2); }
The trap group name can be any string and is embedded
in the community name field of the trap. To configure your own trap
group port, include the destination-port
statement. The
default destination port is port 162.
For each trap group that you define, you must include
the target
statement to define at least one system as the
recipient of the SNMP traps in the trap group. Specify the IPv4 or
IPv6 address of each recipient, not its hostname.
Specify the types of traps the trap group can receive
in the categories
statement. For information about the
category to which the traps belong, see the Standard SNMP Traps Supported by Junos OS and Enterprise-Specific SNMP Traps Supported by Junos
OS topics.
Specify the routing instance used by the trap group
in the routing-instance
statement. All targets configured
in the trap group use this routing instance.
A trap group can receive the following categories:
authentication
—Authentication failureschassis
—Chassis or environment notificationschassis-cluster
—Clustering notificationsconfiguration
—Configuration notificationslink
—Link-related notifications (up-down transitions, DS-3 and DS-1 line status change, IPv6 interface state change, and Passive Monitoring PIC overload)Note:To send Passive Monitoring PIC overload interface traps, select the
link
trap category.otn-alarms
—OTN alarm trap subcategoriesremote-operations
—Remote operation notificationsrmon-alarm
—Alarm for RMON eventsrouting
—Routing protocol notificationsservices
—Services notifications such as circuit down or up, connection down or up, CPU exceeded, alarms, and status changes.sonet-alarms
—SONET/SDH alarmsNote:If you omit the SONET/SDH subcategories, all SONET/SDH trap alarm types are included in trap notifications.
loss-of-light
—Loss of light alarm notificationpll-lock
—PLL lock alarm notificationloss-of-frame
—Loss of frame alarm notificationloss-of-signal
—Loss of signal alarm notificationseverely-errored-frame
—Severely errored frame alarm notificationline-ais
—Line alarm indication signal (AIS) alarm notificationpath-ais
—Path AIS alarm notificationloss-of-pointer
—Loss of pointer alarm notificationber-defect
—SONET/SDH bit error rate alarm defect notificationber-fault
—SONET/SDH error rate alarm fault notificationline-remote-defect-indication
—Line remote defect indication alarm notificationpath-remote-defect-indication
—Path remote defect indication alarm notificationremote-error-indication
—Remote error indication alarm notificationunequipped
—Unequipped alarm notificationpath-mismatch
—Path mismatch alarm notificationloss-of-cell
—Loss of cell delineation alarm notificationvt-ais
—Virtual tributary (VT) AIS alarm notificationvt-loss-of-pointer
—VT loss of pointer alarm notificationvt-remote-defect-indication
—VT remote defect indication alarm notificationvt-unequipped
—VT unequipped alarm notificationvt-label-mismatch
—VT label mismatch error notificationvt-loss-of-cell
—VT loss of cell delineation notification
startup
—System warm and cold startstiming-events
—Timing events and defects notificationvrrp-events
—Virtual Router Redundancy Protocol (VRRP) events such as new-primary or authentication failures
If you include SONET/SDH subcategories, only those SONET/SDH trap alarm types are included in trap notifications.
The version
statement allows you to specify the SNMP
version of the traps sent to targets of the trap group. If you specify v1
only, SNMPv1 traps are sent. If you specify v2
only, SNMPv2 traps are sent. If you specify all
, both
an SNMPv1 and an SNMPv2 trap are sent for every trap condition. For
more information about the version
statement, see version (SNMP).
SNMP Traps Support
The QFX Series standalone switches, QFX Series Virtual Chassis, and QFabric systems support standard SNMP traps and Juniper Networks enterprise-specific traps.
For more information, see:
- SNMP Traps Supported on QFX Series Standalone Switches and QFX Series Virtual Chassis
- SNMP Traps Supported on QFabric Systems
SNMP Traps Supported on QFX Series Standalone Switches and QFX Series Virtual Chassis
QFX Series standalone switches and QFX Series Virtual Chassis support SNMPv1 and v2 traps. For more information, see:
SNMPv1 Traps
QFX Series standalone switches and QFX Series Virtual Chassis support both standard SNMPv1 traps and Juniper Networks enterprise-specific SNMPv1 traps. See:
The traps are organized first by trap category and then by trap name. The system logging severity levels are listed for those traps that have them. Traps that do not have corresponding system logging severity levels are marked with an en dash (–).
Defined in |
Trap Name |
Enterprise ID |
Generic Trap Number |
Specific Trap Number |
System Logging Severity Level |
Syslog Tag |
---|---|---|---|---|---|---|
Link Notifications | ||||||
RFC 1215, Conventions for Defining Traps for Use with the SNMP |
linkDown |
1.3.6.1.4.1.2636 |
2 |
0 |
Warning |
SNMP_ TRAP_ LINK_DOWN |
linkUp |
1.3.6.1.4.1.2636 |
3 |
0 |
Info |
SNMP_TRAP_ LINK_UP |
|
Remote Operations Notifications | ||||||
RFC 2925, Definitions of Managed Objects for Remote Ping, Traceroute, and Lookup Operations |
pingProbeFailed |
1.3.6.1.2.1.80.0 |
6 |
1 |
Info |
SNMP_TRAP _PING_ PROBE_ FAILED |
pingTestFailed |
1.3.6.1.2.1.80.0 |
6 |
2 |
Info |
SNMP_TRAP_ PING_TEST _FAILED |
|
pingTestCompleted |
1.3.6.1.2.1.80.0 |
6 |
3 |
Info |
SNMP_TRAP_ PING_TEST_ COMPLETED |
|
traceRoutePathChange |
1.3.6.1.2.1.81.0 |
6 |
1 |
Info |
SNMP_TRAP_ TRACE_ROUTE_ PATH_CHANGE |
|
traceRouteTestFailed |
1.3.6.1.2.1.81.0 |
6 |
2 |
Info |
SNMP_TRAP_ TRACE_ROUTE_ TEST_FAILED |
|
traceRouteTestCompleted |
1.3.6.1.2.1.81.0 |
6 |
3 |
Info |
SNMP_TRAP_ TRACE_ROUTE_ TEST_COMPLETED |
|
RMON Alarms | ||||||
RFC 2819a, RMON MIB |
fallingAlarm |
1.3.6.1.2.1.16 |
6 |
2 |
– |
– |
risingAlarm |
1.3.6.1.2.1.16 |
6 |
1 |
– |
– |
|
Routing Notifications | ||||||
BGP 4 MIB |
bgpEstablished |
1.3.6.1.2.1.15.7 |
6 |
1 |
– |
– |
bgpBackwardTransition |
1.3.6.1.2.1.15.7 |
6 |
2 |
– |
– |
|
OSPF TRAP MIB |
ospfVirtIfStateChange |
1.3.6.1.2.1.14.16.2 |
6 |
1 |
– |
– |
ospfNbrStateChange |
1.3.6.1.2.1.14.16.2 |
6 |
2 |
– |
– |
|
ospfVirtNbrStateChange |
1.3.6.1.2.1.14.16.2 |
6 |
3 |
– |
– |
|
ospfIfConfigError |
1.3.6.1.2.1.14.16.2 |
6 |
4 |
– |
– |
|
ospfVirtIfConfigError |
1.3.6.1.2.1.14.16.2 |
6 |
5 |
– |
– |
|
ospfIfAuthFailure |
1.3.6.1.2.1.14.16.2 |
6 |
6 |
– |
– |
|
ospfVirtIfAuthFailure |
1.3.6.1.2.1.14.16.2 |
6 |
7 |
– |
– |
|
ospfIfRxBadPacket |
1.3.6.1.2.1.14.16.2 |
6 |
8 |
– |
– |
|
ospfVirtIfRxBadPacket |
1.3.6.1.2.1.14.16.2 |
6 |
9 |
– |
– |
|
ospfTxRetransmit |
1.3.6.1.2.1.14.16.2 |
6 |
10 |
– |
– |
|
ospfVirtIfTxRetransmit |
1.3.6.1.2.1.14.16.2 |
6 |
11 |
– |
– |
|
ospfMaxAgeLsa |
1.3.6.1.2.1.14.16.2 |
6 |
13 |
– |
– |
|
ospfIfStateChange |
1.3.6.1.2.1.14.16.2 |
6 |
16 |
– |
– |
|
Startup Notifications | ||||||
RFC 1215, Conventions for Defining Traps for Use with the SNMP |
authenticationFailure |
1.3.6.1.4.1.2636 |
4 |
0 |
Notice |
SNMPD_ TRAP_ GEN_FAILURE |
coldStart |
1.3.6.1.4.1.2636 |
0 |
0 |
Critical |
SNMPD_TRAP_ COLD_START |
|
warmStart |
1.3.6.1.4.1.2636 |
1 |
0 |
Error |
SNMPD_TRAP_ WARM_START |
|
VRRP Notifications | ||||||
RFC 2787, Definitions of Managed Objects for the Virtual Router Redundancy Protocol |
vrrpTrapNewMaster |
1.3.6.1.2.1.68 |
6 |
1 |
Warning |
VRRPD_NEW MASTER_TRAP |
vrrpTrapAuthFailure |
1.3.6.1.2.1.68 |
6 |
2 |
Warning |
VRRPD_AUTH_ FAILURE_TRAP |
Defined in |
Trap Name |
Enterprise ID |
Generic Trap Number |
Specific Trap Number |
System Logging Severity Level |
System Log Tag |
---|---|---|---|---|---|---|
Chassis Notifications (Alarm Conditions) | ||||||
Chassis MIB (jnx-chassis. mib) |
jnxPowerSupplyFailure |
1.3.6.1.4.1.2636.4.1 |
6 |
1 |
Warning |
CHASSISD_ SNMP_ TRAP |
jnxFanFailure |
1.3.6.1.4.1.26361 |
6 |
2 |
Critical |
CHASSISD_ SNMP_ TRAP |
|
jnxOverTemperature |
11.4.1.2636.4.1 |
6 |
3 |
Alert |
CHASSISD_ SNMP_ TRAP |
|
jnxFruRemoval |
1.3.6.1.4.1.2636.4.1 |
6 |
5 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruInsertion |
1.3.6.1.4.1.2636.4.1 |
6 |
6 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruPowerOff |
1.3.6.1.4.1.2636.4.1 |
6 |
7 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruPowerOn |
1.3.6.1.4.1.2636.4.1 |
6 |
8 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruFailed |
1.3.6.1.4.1.2636.4.1 |
6 |
9 |
Warning |
CHASSISD_ SNMP_ TRAP |
|
jnxFruOffline |
1.3.6.1.4.1.2636.4.1 |
6 |
10 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruOnline |
1.3.6.1.4.1.2636.4.1 |
6 |
11 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruCheck |
1.3.6.1.4.1.2636.4.1 |
6 |
12 |
Warning |
CHASSISD_ SNMP_ TRAP |
|
jnxPowerSupplyOk |
1.3.6.1.4.1.2636.4.2 |
6 |
1 |
Critical |
CHASSISD_ SNMP_ TRAP |
|
jnxFanOK |
1.3.6.1.4.1.2636.4.2 |
6 |
2 |
Critical |
CHASSISD_ SNMP_ TRAP |
|
jnxTemperatureOK |
1.3.6.1.4.1.2636.4.2 |
6 |
3 |
Alert |
CHASSISD_ SNMP_ TRAP |
|
Configuration Notifications | ||||||
Configuration Management MIB (jnx- configmgmt. mib) |
jnxCmCfgChange |
1.3.6.1.4.1.2636.4.5 |
6 |
1 |
– |
– |
jnxCmRescueChange |
1.3.6.1.4.1.2636.4.5 |
6 |
2 |
– |
– |
|
Remote Operations | ||||||
Ping MIB (jnx-ping.mib) |
jnxPingRttThresholdExceeded |
1.3.6.1.4.1.2636.4.9 |
6 |
1 |
– |
– |
jnxPingRttStdDevThreshold Exceeded |
1.3.6.1.4.1.2636.4.9 |
6 |
2 |
– |
– |
|
jnxPingRttJitterThreshold Exceeded |
1.3.6.1.4.1.2636.4.9 |
6 |
3 |
– |
– |
|
jnxPingEgressThreshold Exceeded |
1.3.6.1.4.1.2636.4.9 |
6 |
4 |
– |
– |
|
jnxPingEgressStdDev ThresholdExceeded |
1.3.6.1.4.1.2636.4.9 |
6 |
5 |
– |
– |
|
jnxPingEgressJitterThreshold Exceeded |
1.3.6.1.4.1.2636.4.9 |
6 |
6 |
– |
– |
|
jnxPingIngressThreshold Exceeded |
1.3.6.1.4.1.2636.4.9 |
6 |
7 |
– |
– |
|
jnxPingIngressStddevThreshold Exceeded |
1.3.6.1.4.1.2636.4.9 |
6 |
8 |
– |
– |
|
jnxPingIngressJitterThreshold Exceeded |
1.3.6.1.4.1.2636.4.9 |
6 |
9 |
– |
– |
|
RMON Alarms | ||||||
RMON MIB (jnx-rmon. mib) |
jnxRmonAlarmGetFailure |
1.3.6.1.4.1.2636.4.3 |
6 |
1 |
– |
– |
jnxRmonGetOk |
1.3.6.1.4.1.2636.4.3 |
6 |
2 |
– |
– |
SNMPv2 Traps
Defined in |
Trap Name |
SNMP Trap OID |
System Logging Severity Level |
Syslog Tag |
---|---|---|---|---|
Link Notifications | ||||
RFC 2863, The Interfaces Group MIB |
linkDown |
1.3.6.1.6.3.1.1.5.3 |
Warning |
SNMP_TRAP_ LINK_DOWN |
linkUp |
1.3.6.1.6.3.1.1.5.4 |
Info |
SNMP_TRAP_ LINK_UP |
|
Remote Operations Notifications | ||||
RFC 2925, Definitions of Managed Objects for Remote Ping, Traceroute, and Lookup Operations |
pingProbeFailed |
1.3.6.1.2.1.80.0.1 |
Info |
SNMP_TRAP_ PING_PROBE_ FAILED |
pingTestFailed |
1.3.6.1.2.1.80.0.2 |
Info |
SNMP_TRAP_PING_ TEST_FAILED |
|
pingTestCompleted |
1.3.6.1.2.1.80.0.3 |
Info |
SNMP_TRAP_PING_ TEST_COMPLETED |
|
traceRoutePathChange |
1.3.6.1.2.1.81.0.1 |
Info |
SNMP_TRAP_TRACE_ ROUTE_PATH_ CHANGE |
|
traceRouteTestFailed |
1.3.6.1.2.1.81.0.2 |
Info |
SNMP_TRAP_TRACE_ ROUTE_TEST_FAILED |
|
traceRouteTestCompleted |
1.3.6.1.2.1.81.0.3 |
Info |
SNMP_TRAP_TRACE_ ROUTE_TEST_ COMPLETED |
|
RMON Alarms | ||||
RFC 2819a, RMON MIB |
fallingAlarm |
1.3.6.1.2.1.16.0.1 |
– |
– |
risingAlarm |
1.3.6.1.2.1.16.0.2 |
– |
– |
|
Routing Notifications | ||||
BGP 4 MIB |
bgpEstablished |
1.3.6.1.2.1.15.7.1 |
– |
– |
bgpBackwardTransition |
1.3.6.1.2.1.15.7.2 |
– |
– |
|
OSPF Trap MIB |
ospfVirtIfStateChange |
1.3.6.1.2.1.14.16.2.1 |
– |
– |
ospfNbrStateChange |
1.3.6.1.2.1.14.16.2.2 |
– |
– |
|
ospfVirtNbrStateChange |
1.3.6.1.2.1.14.16.2.3 |
– |
– |
|
ospfIfConfigError |
1.3.6.1.2.1.14.16.2.4 |
– |
– |
|
ospfVirtIfConfigError |
1.3.6.1.2.1.14.16.2.5 |
– |
– |
|
ospfIfAuthFailure |
1.3.6.1.2.1.14.16.2.6 |
– |
– |
|
ospfVirtIfAuthFailure |
1.3.6.1.2.1.14.16.2.7 |
– |
– |
|
ospfIfRxBadPacket |
1.3.6.1.2.1.14.16.2.8 |
– |
– |
|
ospfVirtIfRxBadPacket |
1.3.6.1.2.1.14.16.2.9 |
– |
– |
|
ospfTxRetransmit |
1.3.6.1.2.1.14.16.2.10 |
– |
– |
|
ospfVirtIfTxRetransmit |
1.3.6.1.2.1.14.16.2.11 |
– |
– |
|
ospfMaxAgeLsa |
1.3.6.1.2.1.14.16.2.13 |
– |
– |
|
ospfIfStateChange |
1.3.6.1.2.1.14.16.2.16 |
– |
– |
|
Startup Notifications | ||||
RFC 1907, Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2) |
coldStart |
1.3.6.1.6.3.1.1.5.1 |
Critical |
SNMPD_TRAP_ COLD_START |
warmStart |
1.3.6.1.6.3.1.1.5.2 |
Error |
SNMPD_TRAP_ WARM_START |
|
authenticationFailure |
1.3.6.1.6.3.1.1.5.5 |
Notice |
SNMPD_TRAP_ GEN_FAILURE |
|
VRRP Notifications | ||||
RFC 2787, Definitions of Managed Objects for the Virtual Router Redundancy Protocol |
vrrpTrapNewMaster |
1.3.6.1.2.1.68.0.1 |
Warning |
VRRPD_ NEWMASTER_ TRAP |
vrrpTrapAuthFailure |
1.3.6.1.2.1.68.0.2 |
Warning |
VRRPD_AUTH_ FAILURE_ TRAP |
Source MIB |
Trap Name |
SNMP Trap OID |
System Logging Severity Level |
System Log Tag |
---|---|---|---|---|
Chassis (Alarm Conditions) Notifications | ||||
Chassis MIB (mib-jnx-chassis) |
jnxPowerSupplyFailure |
1.3.6.1.4.1.2636.4.1.1 |
Alert |
CHASSISD_ SNMP_ TRAP |
jnxFanFailure |
1.3.6.1.4.1.2636.4.1.2 |
Critical |
CHASSISD_ SNMP_ TRAP |
|
jnxOverTemperature |
1.3.6.1.4.1.2636.4.1.3 |
Critical |
CHASSISD_ SNMP_ TRAP |
|
jnxFruRemoval |
1.3.6.1.4.1.2636.4.1.5 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruInsertion |
1.3.6.1.4.1.2636.4.1.6 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruPowerOff |
1.3.6.1.4.1.2636.4.1.7 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruPowerOn |
1.3.6.1.4.1.2636.4.1.8 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruFailed |
1.3.6.1.4.1.2636.4.1.9 |
Warning |
CHASSISD_ SNMP_ TRAP |
|
jnxFruOffline |
1.3.6.1.4.1.2636.4.1.10 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruOnline |
1.3.6.1.4.1.2636.4.1.11 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxFruCheck |
1.3.6.1.4.1.2636.4.1.12 |
Notice |
CHASSISD_ SNMP_ TRAP |
|
jnxPowerSupplyOK |
1.3.6.1.4.1.2636.4.2.1 |
Critical |
CHASSISD_ SNMP_ TRAP |
|
jnxFanOK |
1.3.6.1.4.1.2636.4.2.2 |
Critical |
CHASSISD_ SNMP_ TRAP |
|
jnxTemperatureOK |
1.3.6.1.4.1.2636.4.2.3 |
Alert |
CHASSISD_ SNMP_ TRAP |
|
Configuration Notifications | ||||
Configuration Management MIB (mib-jnx-cfgmgmt) |
jnxCmCfgChange |
1.3.6.1.4.1.2636.4.5.0.1 |
– |
– |
jnxCmRescueChange |
1.3.6.1.4.1.2636.4.5.0.2 |
– |
– |
|
Remote Operations Notifications | ||||
Ping MIB (mib-jnx-ping) |
jnxPingRttThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.1 |
– |
– |
jnxPingRttStdDevThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.2 |
– |
– |
|
jnxPingRttJitterThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.3 |
– |
– |
|
jnxPingEgressThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.4 |
– |
– |
|
jnxPingEgressStdDevThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.5 |
– |
– |
|
jnxPingEgressJitterThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.6 |
– |
– |
|
jnxPingIngressThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.7 |
– |
– |
|
jnxPingIngressStddevThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.8 |
– |
– |
|
jnxPingIngressJitterThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.9 |
– |
– |
|
RMON Alarms | ||||
RMON MIB (mib-jnx-rmon) |
jnxRmonAlarmGetFailure |
1.3.6.1.4.1.2636.4. 3.0.1 |
– |
– |
jnxRmonGetOk |
1.3.6.1.4.1.2636.4. 3.0.2 |
– |
– |
SNMP Traps Supported on QFabric Systems
QFabric systems support standard SNMPv2 traps and Juniper Networks enterprise-specific SNMPv2 traps.
QFabric systems do not support SNMPv1 traps.
For more information, see:
Defined in |
Trap Name |
SNMP Trap OID |
System Logging Severity Level |
Syslog Tag |
---|---|---|---|---|
Link Notifications | ||||
RFC 2863, The Interfaces Group MIB |
linkDown |
1.3.6.1.6.3.1.1.5.3 |
Warning |
SNMP_TRAP_ LINK_DOWN |
linkUp |
1.3.6.1.6.3.1.1.5.4 |
Info |
SNMP_TRAP_ LINK_UP |
|
Startup Notifications | ||||
RFC 1907, Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2) |
coldStart |
1.3.6.1.6.3.1.1.5.1 |
Critical |
SNMPD_TRAP_ COLD_START |
warmStart |
1.3.6.1.6.3.1.1.5.2 |
Error |
SNMPD_TRAP_ WARM_START |
|
authenticationFailure |
1.3.6.1.6.3.1.1.5.5 |
Notice |
SNMPD_TRAP_ GEN_FAILURE |
Source MIB |
Trap Name |
SNMP Trap OID |
System Logging Severity Level |
System Log Tag |
---|---|---|---|---|
Fabric Chassis MIB (mib-jnx-fabric- chassis) |
Fabric Chassis (Alarm Conditions) Notifications | |||
jnxFabricPowerSupplyFailure |
1.3.6.1.4.1.2636.4.19.1 |
Warning |
– |
|
jnxFabricFanFailure |
1.3.6.1.4.1.2636.4.19.2 |
Critical |
– |
|
jnxFabricOverTemperature |
1.3.6.1.4.1.2636.4.19.3 |
Alert |
– |
|
jnxFabricRedundancySwitchover |
1.3.6.1.4.1.2636.4.19.4 |
Notice |
– |
|
jnxFabricFruRemoval |
1.3.6.1.4.1.2636.4.19.5 |
Notice |
– |
|
jnxFabricFruInsertion |
1.3.6.1.4.1.2636.4.19.6 |
Notice |
– |
|
jnxFabricFruPowerOff |
1.3.6.1.4.1.2636.4.19.7 |
Notice |
– |
|
jnxFabricFruPowerOn |
1.3.6.1.4.1.2636.4.19.8 |
Notice |
– |
|
jnxFabricFruFailed |
1.3.6.1.4.1.2636.4.19.9 |
Warning |
– |
|
jnxFabricFruOffline |
1.3.6.1.4.1.2636.4.19.10 |
Notice |
– |
|
jnxFabricFruOnline |
1.3.6.1.4.1.2636.4.19.11 |
Notice |
– |
|
jnxFabricFruCheck |
1.3.6.1.4.1.2636.4.19.12 |
Warning |
– |
|
jnxFabricFEBSwitchover |
1.3.6.1.4.1.2636.4.19.13 |
Warning |
– |
|
jnxFabricHardDiskFailed |
1.3.6.1.4.1.2636.4.19.14 |
Warning |
– |
|
jnxFabricHardDiskMissing |
1.3.6.1.4.1.2636.4.19.15 |
Warning |
– |
|
jnxFabricBootFromBackup |
1.3.6.1.4.1.2636.4.19.16 |
Warning |
– |
|
Fabric Chassis (Alarm Cleared Conditions) Notifications | ||||
jnxFabricPowerSupplyOK |
1.3.6.1.4.1.2636.4.20.1 |
Critical |
– |
|
jnxFabricFanOK |
1.3.6.1.4.1.2636.4.20.2 |
Critical |
– |
|
jnxFabricTemperatureOK |
1.3.6.1.4.1.2636.4.20.3 |
Alert |
– |
|
jnxFabricFruOK |
1.3.6.1.4.1.2636.4.20.4 |
– |
– |
|
QFabric MIB (mib-jnx-qf-smi) |
QFabric MIB Notifications | |||
jnxQFabricDownloadIssued |
1.3.6.1.4.1.2636.3.42.1.0.1 |
– |
– |
|
jnxQFabricDownloadFailed |
1.3.6.1.4.1.2636.3.42.1.0.2 |
– |
– |
|
jnxQFabricDownloadSucceeded |
1.3.6.1.4.1.2636.3.42.1.0.3 |
– |
– |
|
jnxQFabricUpgradeIssued |
1.3.6.1.4.1.2636.3.42.1.0.4 |
– |
– |
|
jnxQFabricUpgradeFailed |
1.3.6.1.4.1.2636.3.42.1.0.5 |
– |
– |
|
jnxQFabricUpgradeSucceeded |
1.3.6.1.4.1.2636.3.42.1.0.6 |
– |
– |
|
Configuration Notifications | ||||
Configuration Management MIB (mib-jnx-cfgmgmt) |
jnxCmCfgChange |
1.3.6.1.4.1.2636.4.5.0.1 |
– |
– |
jnxCmRescueChange |
1.3.6.1.4.1.2636.4.5.0.2 |
– |
– |
|
Remote Operations Notifications | ||||
Ping MIB (mib-jnx-ping) |
jnxPingRttThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.1 |
– |
– |
jnxPingRttStdDevThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.2 |
– |
– |
|
jnxPingRttJitterThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.3 |
– |
– |
|
jnxPingEgressThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.4 |
– |
– |
|
jnxPingEgressStdDevThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.5 |
– |
– |
|
jnxPingEgressJitterThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.6 |
– |
– |
|
jnxPingIngressThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.7 |
– |
– |
|
jnxPingIngressStddevThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.8 |
– |
– |
|
jnxPingIngressJitterThreshold Exceeded |
1.3.6.1.4.1.2636.4.9.0.9 |
– |
– |
See Also
Example: Configuring SNMP Trap Groups
Set up a trap notification list named urgent-dispatcher
for link and startup traps. This list is used to identify the network
management hosts (1.2.3.4
and fe80::1:2:3:4
)
to which traps generated by the local router should be sent. The name
specified for a trap group is used as the SNMP community string when
the agent sends traps to the listed targets.
[edit] snmp { trap-group "urgent-dispatcher" { version v2; categories link startup; targets { 1.2.3.4; fe80::1:2:3:4; } } }
Configuring the Interfaces on Which SNMP Requests Can Be Accepted
By default, all router or switch interfaces have SNMP access
privileges. To limit the access through certain interfaces only, include
the interface
statement at the [edit snmp]
hierarchy
level:
[edit snmp] interface [ interface-names ];
Specify the names of any logical or physical interfaces that should have SNMP access privileges. Any SNMP requests entering the router or switch from interfaces not listed are discarded.
Example: Configuring Secured Access List Checking
SNMP access privileges are granted to only devices on
interfaces so-0/0/0
and at-1/0/1
. The following
example does this by configuring a list of logical interfaces:
[edit] snmp { interface [ so-0/0/0.0 so-0/0/0.1 at-1/0/1.0 at-1/0/1.1 ]; }
The following example grants the same access by configuring a list of physical interfaces:
[edit] snmp { interface [ so-0/0/0 at-1/0/1 ]; }
Filtering Interface Information Out of SNMP Get and GetNext Output
Junos OS enables you to filter out information related to specific
interfaces from the output of SNMP Get
and GetNext
requests performed on interface-related MIBs such as IF MIB, ATM
MIB, RMON MIB, and the Juniper Networks enterprise-specific IF MIB.
You can use the following options of the filter-interfaces
statement at the [edit snmp]
hierarchy level to specify
the interfaces that you want to exclude from SNMP Get
and GetNext
queries:
interfaces
—Interfaces that match the specified regular expressions.all-internal-interfaces
—Internal interfaces.
[edit] snmp { filter-interfaces { interfaces { interface-name 1; interface-name 2; } all-internal-interfaces; } }
Starting with Release 12.1, Junos OS provides an except option
(!
operator) that enables you to filter out all interfaces
except those interfaces that match all the regular expressions prefixed
with the !
mark.
For example, to filter out all interfaces except the ge
interfaces from the SNMP get
and get-next
results,
enter the following command:
[edit snmp] user@host# set filter-interfaces interfaces “!^ge-.*” user@host# commit
When this is configured, Junos OS filters out all interfaces
except the ge
interfaces from the SNMP get
and get-next
results.
The !
mark is supported only as the first character
of the regular expression. If it appears anywhere else in a regular
expression, Junos OS considers the regular expression invalid, and
returns an error.
However, note that these settings are limited to SNMP operations,
and the users can continue to access information related to the interfaces
(including those hidden using the filter-interfaces
options)
using the appropriate Junos OS command-line interface (CLI) commands.
Configuring MIB Views
SNMPv3 defines the concept of MIB views in RFC 3415, View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). MIB views provide an agent better control over who can access specific branches and objects within its MIB tree. A view consists of a name and a collection of SNMP object identifiers, which are either explicitly included or excluded. Once defined, a view is then assigned to an SNMPv3 group or SNMPv1/v2c community (or multiple communities), automatically masking which parts of the agent’s MIB tree members of the group or community can (or cannot) access.
By default, an SNMP community grants read access and denies
write access to all supported MIB objects (even communities configured
as authorization read-write
). To restrict or grant
read or write access to a set of MIB objects, you must configure a
MIB view and associate the view with a community.
To configure MIB views, include the view
statement
at the [edit snmp]
hierarchy level:
[edit snmp] view view-name { oid object-identifier (include | exclude); }
The view
statement defines a MIB view and identifies a group of MIB objects.
Each MIB object of a view has a common object identifier (OID) prefix. Each object
identifier represents a subtree of the MIB object hierarchy. The subtree can be
represented either by a sequence of dotted integers (such as
1.3.6.1.2.1.2
) or by its subtree name (such as
interfaces
). A configuration statement uses a view to specify a
group of MIB objects on which to define access. You can also use a wildcard
character asterisk (*) to include OIDs that match a particular pattern in the SNMP
view. You need to use * for each sub-OIDs to match. For example, use OID
interfaces.*.*.*.123 to match OID interfaces.2.1.2.123. Wildcard interfaces.*.123
will not match OID interfaces.2.1.2.123. To enable a view, you must associate the
view with a community.
To remove an OID completely, use the delete view all oid oid-number
command but omit the include
parameter.
[edit groups global snmp] user@host# set view view-name oid object-identifier (include | exclude)
The following example creates a MIB view called ping-mib-view.
The oid
statement does not require a dot at the beginning
of the object identifier. The snmp view
statement includes
the branch under the object identifier .1.3.6.1.2.1.80. This includes
the entire DISMAN-PINGMIB subtree (as defined in RFC 2925, Definitions of Managed Objects for Remote Ping, Traceroute, and Lookup
Operations), which effectively permits access to any object
under that branch.
[edit groups global snmp] user@host# set view ping-mib-view oid 1.3.6.1.2.1.80 include
The following example adds a second branch in the same MIB view.
[edit groups global snmp] user@host# set view ping-mib-view oid jnxPingMIB include
Assign a MIB view to a community that you want to control.
To associate MIB views with a community, include the view
statement at the [edit snmp community community-name]
hierarchy level:
[edit snmp community community-name] view view-name;
For more information about the Ping MIB, see RFC 2925 and PING MIB.
See Also
Configuring Ping Proxy MIB
Restrict the ping-mib community to read and write access of the Ping MIB and jnxpingMIB
only. Read or write access to any other MIB using this community
is not allowed.
[edit snmp] view ping-mib-view { oid 1.3.6.1.2.1.80 include; #pingMIB oid jnxPingMIB include; #jnxPingMIB } community ping-mib { authorization read-write; view ping-mib-view; }
The following configuration prevents the no-ping-mib community from accessing Ping MIB and jnxPingMIB
objects. However, this configuration does not prevent
the no-ping-mib community from accessing
any other MIB object that is supported on the device.
[edit snmp] view no-ping-mib-view { oid 1.3.6.1.2.1.80 exclude; # deny access to pingMIB objects oid jnxPingMIB exclude; # deny access to jnxPingMIB objects } community no-ping-mib { authorization read-write; view ping-mib-view; }
See Also
Understanding the Integrated Local Management Interface
The Integrated Local Management Interface (ILMI) provides a mechanism for Asynchronous Transfer Mode (ATM)-attached devices, such as hosts, routers, and ATM switches, to transfer management information. ILMI provides bidirectional exchange of management information between two ATM interfaces across a physical connection. ILMI information is exchanged over a direct encapsulation of SNMP version 1 (RFC 1157, A Simple Network Management Protocol) over ATM Adaptation Layer 5 (AAL5) using a virtual path identifier/virtual channel identifier (VPI/VCI) value (VPI=0, VCI=16).
Junos OS supports only two ILMI MIB variables: atmfMYIPNmAddress
and atmfPortMyIfname
. For ATM1 and ATM2 intelligent queuing
(IQ) interfaces, you can configure ILMI to communicate directly with
an attached ATM switch to enable querying of the switch’s IP
address and port number.
For more information about the
ILMI MIB, see atmfMYIPNmAddress
or atmfPortMyIfname
in the SNMP MIB
Explorer.
See Also
Utility MIB
The Juniper Networks enterprise-specific Utility MIB, whose object ID is {jnxUtilMibRoot 1}, defines objects for counters, integers, and strings. The Utility MIB contains one table for each of the following five data types:
32-bit counters
64-bit counters
Signed integers
Unsigned integers
Octet strings
Each data type has an arbitrary ASCII name, which is defined when the data is populated, and a timestamp that shows the last time when the data instance was modified. For a downloadable version of this MIB, see Routing Policies, Firewall Filters, and Traffic Policers User Guide.
For information about the enterprise-specific Utility MIB objects, see the following topics:
See Also
SNMP MIBs Support
The QFX Series standalone switches, QFX Series Virtual Chassis, and QFabric systems support standard MIBs and Juniper Networks enterprise-specific MIBs.
For information about enterprise-specific SNMP MIB objects, see the SNMP MIB Explorer. You can use SNMP MIB Explorer to view information about various MIBs, MIB objects, and SNMP notifications supported on Juniper Networks devices
For more information, see:
- MIBs Supported on QFX Series Standalone Switches and QFX Series Virtual Chassis
- MIBs Supported on QFabric Systems
MIBs Supported on QFX Series Standalone Switches and QFX Series Virtual Chassis
The QFX Series standalone switches and QFX Series Virtual Chassis support both standard MIBs and Juniper Networks enterprise-specific MIBs. For more information, see:
RFC |
Additional Information |
---|---|
IEEE 802.1ab section 12.1, Link Layer Discovery Protocol (LLDP) MIB |
Supported tables and objects:
|
IEEE 802.3ad, Aggregation of Multiple Link Segments |
The following tables and objects are supported:
|
RFC 1155, Structure and Identification of Management Information for TCP/IP-based Internets |
— |
RFC 1157, A Simple Network Management Protocol (SNMP) |
— |
RFC 1212, Concise MIB Definitions |
— |
RFC 1213, Management Information Base for Network Management of TCP/IP-Based Internets: MIB-II |
The following areas are supported:
|
RFC 1215, A Convention for Defining Traps for use with the SNMP |
Support is limited to MIB II SNMP version 1 traps and version 2 notifications. |
RFC 1286, Definitions of Managed Objects for Bridges |
— |
RFC 1657, Definitions of Managed Objects for the Fourth Version of the Border Gateway Protocol (BGP-4) using SMIv2 |
— |
RFC 1850, OSPF Version 2 Management Information Base |
The following table, objects, and traps are not supported:
|
RFC 1901, Introduction to Community-based SNMPv2 |
— |
RFC 1905, Protocol Operations for Version 2 of the Simple Network Management Protocol (SNMPv2) |
— |
RFC 1907, Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2) |
— |
RFC 2011, SNMPv2 Management Information Base for the Internet Protocol Using SMIv2 |
— |
RFC 2012, SNMPv2 Management Information Base for the Transmission Control Protocol Using SMIv2 |
— |
RFC 2013, SNMPv2 Management Information Base for the User Datagram Protocol Using SMIv2 |
— |
RFC 2233, The Interfaces Group MIB Using SMIv2 |
Note:
RFC 2233 has been replaced by RFC 2863. However, Junos OS supports both RFC 2233 and RFC 2863. |
RFC 2287, Definitions of System-Level Managed Objects for Applications |
The following objects are supported:
|
RFC 2570, Introduction to Version 3 of the Internet-standard Network Management Framework |
— |
RFC 2571, An Architecture for Describing SNMP Management Frameworks (read-only access) |
Note:
RFC 2571 has been replaced by RFC 3411. However, Junos OS supports both RFC 2571 and RFC 3411. |
RFC 2572, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) (read-only access) |
Note:
RFC 2572 has been replaced by RFC 3412. However, Junos OS supports both RFC 2572 and RFC 3412. |
RFC 2576, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |
Note:
RFC 2576 has been replaced by RFC 3584. However, Junos OS supports both RFC 2576 and RFC 3584. |
RFC 2578, Structure of Management Information Version 2 (SMIv2) |
— |
RFC 2579, Textual Conventions for SMIv2 |
— |
RFC 2580, Conformance Statements for SMIv2 |
— |
RFC 2665, Definitions of Managed Objects for the Ethernet-like Interface Types |
— |
RFC 2787, Definitions of Managed Objects for the Virtual Router Redundancy Protocol |
Support does not include row creation, the Set operation, and the vrrpStatsPacketLengthErrors object. |
RFC 2790, Host Resources MIB |
Support is limited to the following objects:
|
RFC 2819, Remote Network Monitoring Management Information Base |
The following objects are supported:
|
RFC 2863, The Interfaces Group MIB |
Note:
RFC 2233 has been replaced by RFC 2863. However, Junos OS supports both RFC 2233 and RFC 2863. |
RFC 2932, IPv4 Multicast Routing MIB |
— |
RFC 2933, Internet Group Management Protocol (IGMP) MIB |
— |
RFC 2934, Protocol Independent Multicast MIB for IPv4 |
In Junos OS, RFC 2934 is implemented based on a draft version, pimmib.mib, of the now standard RFC. |
RFC 3410, Introduction and Applicability Statements for Internet Standard Management Framework |
— |
RFC 3411, An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks |
Note:
RFC 3411 replaces RFC 2571. However, Junos OS supports both RFC 3411 and RFC 2571. |
RFC 3412, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) |
Note:
RFC 3412 replaces RFC 2572. However, Junos OS supports both RFC 3412 and RFC 2572. |
RFC 3413, Simple Network Management Protocol (SNMP) Applications |
All MIBs are supported except for the Proxy MIB. |
RFC 3414, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) |
— |
RFC 3415, View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP) |
— |
RFC 3416, Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP) |
Note:
RFC 3416 replaces RFC 1905, which was supported in earlier versions of Junos OS. |
RFC 3417, Transport Mappings for the Simple Network Management Protocol (SNMP) |
— |
RFC 3418, Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) |
Note:
RFC 3418 replaces RFC 1907, which was supported in earlier versions of Junos OS. |
RFC 3584, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |
— |
RFC 3826, The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model |
— |
RFC 4188, Definitions of Managed Objects for Bridges |
The QFX3500 and QFX3600 switches support 802.1D STP (1998) and the following subtrees and objects only:
Note:
On QFX3500 and QFX3600 switches, the dot1dTpFdbTable table is
populated only with MAC addresses learned on the default VLAN. To
see the MAC addresses of all VLANs, specify the dot1qTpFdbTable table
(RFC 4363b, Q-Bridge VLAN MIB) when you issue
the Not supported on OCX Series devices. |
RFC 4293, Management Information Base for the Internet Protocol (IP) |
Supports the ipAddrTable table only. |
RFC 4318, Definitions of Managed Objects for Bridges with Rapid Spanning Tree Protocol |
Supports 802.1w and 802.1t extensions for RSTP. Not supported on OCX Series devices. |
RFC 4363b, Q-Bridge VLAN MIB |
Note:
On QFX3500 and QFX3600 switches, the dot1dTpFdbTable table (RFC
4188, Definitions of Managed Objects for Bridges) is populated only with MAC addresses learned on the default VLAN.
To see the MAC addresses of all VLANs, specify the dot1qTpFdbTable
table (in this MIB) when you issue the Not supported on OCX Series devices. |
RFC 4444, IS-IS MIB |
— |
Internet Assigned Numbers Authority, IANAiftype Textual Convention MIB (referenced by RFC 2233) |
|
Internet draft draft-reeder-snmpv3-usm-3desede-00.txt, Extension to the User-Based Security Model (USM) to Support Triple-DES EDE in ‘Outside’ CBC Mode |
— |
Internet draft draft-ietf-idmr-igmp-mib-13.txt, Internet Group Management Protocol (IGMP) MIB |
— |
ESO Consortium MIB |
Note:
The ESO Consortium MIB has been replaced by RFC 3826. See http://www.snmp.com/eso/. |
MIB |
Description |
---|---|
Alarm MIB (mib-jnx-chassis-alarm) |
Provides support for alarms from the switch. |
Analyzer MIB (mib-jnx-analyzer) |
Contains analyzer and remote analyzer data related to port mirroring. Not supported on OCX Series devices. |
Chassis MIB (mib-jnx-chassis) |
Provides support for environmental monitoring (power supply state, board voltages, fans, temperatures, and airflow) and inventory support for the chassis, Flexible PIC Concentrators (FPCs), and PICs. Note:
The jnxLEDTable table has been deprecated. |
Chassis Definitions for Router Model MIB (mib-jnx-chas-defines) |
Contains the object identifiers (OIDs) that are used by the Chassis MIB to identify routing and switching platforms and chassis components. The Chassis MIB provides information that changes often, whereas the Chassis Definitions for Router Model MIB provides information that changes less often. |
Class-of-Service MIB (mib-jnx-cos) |
Provides support for monitoring interface output queue statistics per interface and per forwarding class. |
Configuration Management MIB (mib-jnx-cfgmgmt) |
Provides notification for configuration changes and rescue configuration changes in the form of SNMP traps. Each trap contains the time at which the configuration change was committed, the name of the user who made the change, and the method by which the change was made. A history of the last 32 configuration changes is kept in jnxCmChgEventTable. |
Ethernet MAC MIB (mib-jnx-mac) |
Monitors media access control (MAC) statistics on Gigabit Ethernet intelligent queuing (IQ) interfaces. It collects MAC statistics; for example, inoctets, inframes, outoctets, and outframes on each source MAC address and virtual LAN (VLAN) ID for each Ethernet port. Not supported on OCX Series devices. |
Event MIB (mib-jnx-event) |
Defines a generic trap that can be generated using an operations script or event policy. This MIB provides the ability to specify a system log string and raise a trap if that system log string is found. In Junos OS release 13.2X51-D10 or later, if you configured an event policy to raise a trap when a new SNMP trap target is added, the SNMPD_TRAP_TARGET_ADD_NOTICE trap is generated with information about the new target. |
Firewall MIB (mib-jnx-firewall) |
Provides support for monitoring firewall filter counters. |
Host Resources MIB (mib-jnx-hostresources) |
Extends the hrStorageTable object, providing a measure of the usage of each file system on the switch as a percentage. Previously, the objects in the hrStorageTable measured the usage in allocation units—hrStorageUsed and hrStorageAllocationUnits—only. Using the percentage measurement, you can more easily monitor and apply thresholds on usage. |
Interface MIB (Extensions) (mib-jnx-if-extensions) |
Extends the standard ifTable (RFC 2863) with additional statistics and Juniper Networks enterprise-specific chassis information in the ifJnxTable and ifChassisTable tables. |
L2ALD MIB (mib-jnx-l2ald) |
Provides information about Layer 2 Address Learning and related traps, such as the routing instance MAC limit trap and interface MAC limit trap. This MIB also provides VLAN information in the jnxL2aldVlanTable table for Enhanced Layer 2 Software (ELS) EX Series and QFX Series switches. Note:
Non-ELS EX Series switches use the VLAN MIB (jnxExVlanTable) for VLAN information instead of this MIB. |
MPLS MIB (mib-jnx-mpls) |
Provides MPLS information and defines MPLS notifications. Note:
This MIB is not supported on the QFX5100 switch. |
MPLS LDP MIB (mib-jnx-mpls-ldp) |
Contains object definitions as described in RFC 3815, Definitions of Managed Objects for the Multiprotocol Label Switching (MPLS), Label Distribution Protocol (LDP). Note:
This MIB is not supported on the QFX5100 switch. |
Ping MIB (mib-jnx-ping) |
Extends the standard Ping MIB control table (RFC 2925). Items in this MIB are created when entries are created in pingCtlTable of the Ping MIB. Each item is indexed exactly as it is in the Ping MIB. |
RMON Events and Alarms MIB (mib-jnx-rmon) |
Supports Junos OS extensions to the standard Remote Monitoring (RMON) Events and Alarms MIB (RFC 2819). The extension augments the alarmTable object with additional information about each alarm. Two additional traps are also defined to indicate when problems are encountered with an alarm. |
Structure of Management Information MIB (mib-jnx-smi) |
Explains how the Juniper Networks enterprise-specific MIBs are structured. |
System Log MIB (mib-jnx-syslog) |
Enables notification of an SNMP trap-based application when an important system log message occurs. |
Utility MIB (mib-jnx-util) |
Provides you with SNMP MIB container objects of the following types: 32-bit counters, 64-bit counters, signed integers, unsigned integers, and octet strings. You can use these objects to store data that can be retrieved using other SNMP operations. |
VLAN MIB (mib-jnx-vlan) |
Contains information about prestandard IEEE 802.10 VLANs and their association with LAN emulation clients. Note:
For ELS EX Series switches and QFX Series switches, VLAN information is available in the L2ALD MIB in the jnxL2aldVlanTable table instead of in the VLAN MIB For non-ELS EX Series switches, VLAN information is provided in the VLAN MIB in the jnxExVlanTable table. Not supported on OCX Series devices. |
MIBs Supported on QFabric Systems
The QFabric systems support both standard MIBs and Juniper Networks enterprise-specific MIBs. For more information, see:
RFC |
Additional Information |
---|---|
RFC 1155, Structure and Identification of Management Information for TCP/IP-based Internets |
— |
RFC 1157, A Simple Network Management Protocol (SNMP) |
— |
RFC 1212, Concise MIB Definitions |
— |
RFC 1213, Management Information Base for Network Management of TCP/IP-Based Internets: MIB-II |
The following areas are supported:
|
RFC 1215, A Convention for Defining Traps for use with the SNMP |
Support is limited to MIB II SNMP version 1 traps and version 2 notifications. |
RFC 1286, Definitions of Managed Objects for Bridges |
— |
RFC 1901, Introduction to Community-based SNMPv2 |
— |
RFC 1905, Protocol Operations for Version 2 of the Simple Network Management Protocol (SNMPv2) |
— |
RFC 1907, Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2) |
— |
RFC 2011, SNMPv2 Management Information Base for the Internet Protocol Using SMIv2 |
Note:
On the QFabric system, for the SNMP mibwalk request to work, you must configure the IP address of at least one interface besides the management Ethernet interfaces (me0 and me1) in the Director group. |
RFC 2012, SNMPv2 Management Information Base for the Transmission Control Protocol Using SMIv2 |
— |
RFC 2013, SNMPv2 Management Information Base for the User Datagram Protocol Using SMIv2 |
— |
RFC 2233, The Interfaces Group MIB Using SMIv2 |
Note:
RFC 2233 has been replaced by RFC 2863. However, Junos OS supports both RFC 2233 and RFC 2863. Note:
The QFabric system supports the following objects only: ifNumber, ifTable, and ifxTable. |
RFC 2571, An Architecture for Describing SNMP Management Frameworks (read-only access) |
Note:
RFC 2571 has been replaced by RFC 3411. However, Junos OS supports both RFC 2571 and RFC 3411. |
RFC 2572, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) (read-only access) |
Note:
RFC 2572 has been replaced by RFC 3412. However, Junos OS supports both RFC 2572 and RFC 3412. |
RFC 2576, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |
Note:
RFC 2576 has been replaced by RFC 3584. However, Junos OS supports both RFC 2576 and RFC 3584. |
RFC 2578, Structure of Management Information Version 2 (SMIv2) |
— |
RFC 2579, Textual Conventions for SMIv2 |
— |
RFC 2580, Conformance Statements for SMIv2 |
— |
RFC 2665, Definitions of Managed Objects for the Ethernet-like Interface Types |
The QFabric system supports the following tables only:
Note:
Scalar variables are not supported on the QFabric system. |
RFC 2863, The Interfaces Group MIB |
Note:
RFC 2233 has been replaced by RFC 2863. However, Junos OS supports both RFC 2233 and RFC 2863. Note:
The QFabric system supports the following objects only: ifNumber, ifTable, and ifxTable. |
RFC 2933, Internet Group Management Protocol (IGMP) MIB |
— |
RFC 3410, Introduction and Applicability Statements for Internet Standard Management Framework |
— |
RFC 3411, An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks |
Note:
RFC 3411 replaces RFC 2571. However, Junos OS supports both RFC 3411 and RFC 2571. |
RFC 3412, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) |
Note:
RFC 3412 replaces RFC 2572. However, Junos OS supports both RFC 3412 and RFC 2572. |
RFC 3416, Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP) |
Note:
RFC 3416 replaces RFC 1905, which was supported in earlier versions of Junos OS. |
RFC 3417, Transport Mappings for the Simple Network Management Protocol (SNMP) |
— |
RFC 3418, Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) |
Note:
RFC 3418 replaces RFC 1907, which was supported in earlier versions of Junos OS. |
RFC 3584, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |
— |
RFC 4188, Definitions of Managed Objects for Bridges |
The QFabric system support is limited to the following objects:
Not supported on OCX Series devices. |
RFC 4293, Management Information Base for the Internet Protocol (IP) |
Supports the ipAddrTable table only. On the QFabric system, supported objects in the ipAddrTable table include: ipAdEntAddr, ipAdEntIfIndex, ipAdEntNetMask, ipAdEntBcastAddr, and ipAdEntReasmMaxSize. Note:
On the QFabric system, for the SNMP mibwalk request to work, you must configure the IP address of at least one interface besides the management Ethernet interfaces (me0 and me1) in the Director group. |
RFC 4363b, Q-Bridge VLAN MIB |
The QFabric system supports the following tables only:
Not supported on OCX Series devices. |
QFabric-specific MIBs are not supported on OCX Series devices.
MIB |
Description |
---|---|
Analyzer MIB (mib-jnx-analyzer) |
Contains analyzer and remote analyzer data related to port mirroring. The QFabric system supports:
|
Chassis MIB (mib-jnx-chassis) |
Note:
The Chassis MIB has been deprecated for the QFabric system. We recommend that you use the Fabric Chassis MIB (mib-jnx-fabric-chassis) for information about the QFabric system. |
Class-of-Service MIB (mib-jnx-cos) |
Provides support for monitoring interface output queue statistics per interface and per forwarding class. The QFabric system supports the following tables and objects:
The QFabric system does not support any traps for this MIB. |
Configuration Management MIB (mib-jnx-cfgmgmt) |
Provides notification for configuration changes and rescue configuration changes in the form of SNMP traps. Each trap contains the time at which the configuration change was committed, the name of the user who made the change, and the method by which the change was made. A history of the last 32 configuration changes is kept in jnxCmChgEventTable. Note:
On the QFabric system, these conditions apply:
|
Fabric Chassis MIB (mib-jnx-fabric-chassis) |
Provides hardware information about the QFabric system and its component devices. This MIB is based on the Juniper Networks enterprise-specific Chassis MIB but adds another level of indexing that provides information for QFabric system component devices. |
Interface MIB (Extensions) (mib-jnx-if-extensions) |
Extends the standard ifTable (RFC 2863) with additional statistics and Juniper Networks enterprise-specific chassis information in the ifJnxTable and ifChassisTable tables. Note:
On the QFabric system, scalar variables are not supported. |
Power Supply Unit MIB (mib-jnx-power-supply-unit) |
Provides support for environmental monitoring of the power supply unit for the Interconnect device of the QFabric system. Note:
On the QFabric system, scalar variables for the jnxPsuObjects 1 object ID in the jnxPsuScalars table are not supported. |
QFabric MIB (jnx-qf-smi) |
Explains how the Juniper Networks enterprise-specific QFabric MIBs are structured. Defines the MIB objects that are reported by the QFabric system and the contents of the traps that can be issued by the QFabric system. |
Utility MIB (mib-jnx-util) |
Provides you with SNMP MIB container objects of the following types: 32-bit counters, 64-bit counters, signed integers, unsigned integers, and octet strings. You can use these objects to store data that can be retrieved using other SNMP operations. |
See Also
MIB Objects for the QFX Series
This topic lists the Juniper Networks enterprise-specific SNMP Chassis MIB definition objects for the QFX Series:
- QFX Series Standalone Switches
- QFabric Systems
- QFabric System QFX3100 Director Device
- QFabric System QFX3008-I Interconnect Device
- QFabric System QFX3600-I Interconnect Device
- QFabric System Node Devices
QFX Series Standalone Switches
jnxProductLineQFXSwitch OBJECT IDENTIFIER ::= { jnxProductLine 82 } jnxProductNameQFXSwitch OBJECT IDENTIFIER ::= { jnxProductName 82 } jnxProductModelQFXSwitch OBJECT IDENTIFIER ::= { jnxProductModel 82 } jnxProductVariationQFXSwitch OBJECT IDENTIFIER ::= { jnxProductVariation 82 } jnxProductQFX3500s OBJECT IDENTIFIER ::= { jnxProductVariationQFXSwitch 1 } jnxProductQFX360016QS OBJECT IDENTIFIER ::= { jnxProductVariationQFXSwitch 2 } jnxProductQFX350048T4QS OBJECT IDENTIFIER ::= { jnxProductVariationQFXSwitch 3 } jnxProductQFX510024Q OBJECT IDENTIFIER ::= { jnxProductVariationQFXSwitch 4 } jnxProductQFX510048S6Q OBJECT IDENTIFIER ::= { jnxProductVariationQFXSwitch 5 } jnxChassisQFXSwitch OBJECT IDENTIFIER ::= { jnxChassis 82 } jnxSlotQFXSwitch OBJECT IDENTIFIER ::= { jnxSlot 82 } jnxQFXSwitchSlotFPC OBJECT IDENTIFIER ::= { jnxSlotQFXSwitch 1 } jnxQFXSwitchSlotHM OBJECT IDENTIFIER ::= { jnxSlotQFXSwitch 2 } jnxQFXSwitchSlotPower OBJECT IDENTIFIER ::= { jnxSlotQFXSwitch 3 } jnxQFXSwitchSlotFan OBJECT IDENTIFIER ::= { jnxSlotQFXSwitch 4 } jnxQFXSwitchSlotFPB OBJECT IDENTIFIER ::= { jnxSlotQFXSwitch 5 } jnxMediaCardSpaceQFXSwitch OBJECT IDENTIFIER ::= { jnxMediaCardSpace 82 } jnxQFXSwitchMediaCardSpacePIC OBJECT IDENTIFIER ::= { jnxMediaCardSpaceQFXSwitch 1 }
QFabric Systems
jnxProductLineQFX3000 OBJECT IDENTIFIER ::= { jnxProductLine 84 } jnxProductNameQFX3000 OBJECT IDENTIFIER ::= { jnxProductName 84 } jnxProductModelQFX3000 OBJECT IDENTIFIER ::= { jnxProductModel 84 } jnxProductVariationQFX3000 OBJECT IDENTIFIER ::= { jnxProductVariation 84 } jnxProductQFX3000-G OBJECT IDENTIFIER ::= { jnxProductVariationQFX3000 1 } jnxProductQFX3000-M OBJECT IDENTIFIER ::= { jnxProductVariationQFX3000 2 } jnxChassisQFX3000 OBJECT IDENTIFIER ::= { jnxChassis 84 }
QFabric System QFX3100 Director Device
jnxProductLineQFX3100 OBJECT IDENTIFIER ::= { jnxProductLine 100 } jnxProductNameQFX3100 OBJECT IDENTIFIER ::= { jnxProductName 100 } jnxProductModelQFX3100 OBJECT IDENTIFIER ::= { jnxProductModel 100 } jnxProductVariationQFX3100 OBJECT IDENTIFIER ::= { jnxProductVariation 100 } jnxChassisQFX3100 OBJECT IDENTIFIER ::= { jnxChassis 100 } jnxSlotQFX3100 OBJECT IDENTIFIER ::= { jnxSlot 100 } jnxQFX3100SlotCPU OBJECT IDENTIFIER ::= { jnxSlotQFX3100 1 } jnxQFX3100SlotMemory OBJECT IDENTIFIER ::= { jnxSlotQFX3100 2 } jnxQFX3100SlotPower OBJECT IDENTIFIER ::= { jnxSlotQFX3100 3 } jnxQFX3100SlotFan OBJECT IDENTIFIER ::= { jnxSlotQFX3100 4 } jnxQFX3100SlotHardDisk OBJECT IDENTIFIER ::= { jnxSlotQFX3100 5 } jnxQFX3100SlotNIC OBJECT IDENTIFIER ::= { jnxSlotQFX3100 6 }
QFabric System QFX3008-I Interconnect Device
jnxProductLineQFXInterconnect OBJECT IDENTIFIER ::= { jnxProductLine 60 } jnxProductNameQFXInterconnect OBJECT IDENTIFIER ::= { jnxProductName 60 } jnxProductModelQFXInterconnect OBJECT IDENTIFIER ::= { jnxProductModel 60 } jnxProductVariationQFXInterconnect OBJECT IDENTIFIER ::= { jnxProductVariation 60 } jnxProductQFX3008 OBJECT IDENTIFIER ::= { jnxProductVariationQFXInterconnect 1 } jnxProductQFXC083008 OBJECT IDENTIFIER ::= { jnxProductVariationQFXInterconnect 2 } jnxProductQFX3008I OBJECT IDENTIFIER ::= { jnxProductVariationQFXInterconnect 3 } jnxChassisQFXInterconnect OBJECT IDENTIFIER ::= { jnxChassis 60 } jnxSlotQFXInterconnect OBJECT IDENTIFIER ::= { jnxSlot 60 } jnxQFXInterconnectSlotFPC OBJECT IDENTIFIER ::= { jnxSlotQFXInterconnect 1 } jnxQFXInterconnectSlotHM OBJECT IDENTIFIER ::= { jnxSlotQFXInterconnect 2 } jnxQFXInterconnectSlotPower OBJECT IDENTIFIER ::= { jnxSlotQFXInterconnect 3 } jnxQFXInterconnectSlotFan OBJECT IDENTIFIER ::= { jnxSlotQFXInterconnect 4 } jnxQFXInterconnectSlotCBD OBJECT IDENTIFIER ::= { jnxSlotQFXInterconnect 5 } jnxQFXInterconnectSlotFPB OBJECT IDENTIFIER ::= { jnxSlotQFXInterconnect 6 } jnxMediaCardSpaceQFXInterconnect OBJECT IDENTIFIER ::= { jnxMediaCardSpace 60 } jnxQFXInterconnectMediaCardSpacePIC OBJECT IDENTIFIER ::= { jnxMediaCardSpaceQFXInterconnect 1 } jnxMidplaneQFXInterconnect OBJECT IDENTIFIER ::= { jnxBackplane 60 }
QFabric System QFX3600-I Interconnect Device
jnxProductLineQFXMInterconnect OBJECT IDENTIFIER ::= { jnxProductLine 91 } jnxProductNameQFXMInterconnect OBJECT IDENTIFIER ::= { jnxProductName 91 } jnxProductModelQFXMInterconnect OBJECT IDENTIFIER ::= { jnxProductModel 91 } jnxProductVariationQFXMInterconnect OBJECT IDENTIFIER ::= { jnxProductVariation 91 } jnxProductQFX3600I OBJECT IDENTIFIER ::= { jnxProductVariationQFXMInterconnect 1 } jnxChassisQFXMInterconnect OBJECT IDENTIFIER ::= { jnxChassis 91 } jnxSlotQFXMInterconnect OBJECT IDENTIFIER ::= { jnxSlot 91 } jnxQFXMInterconnectSlotFPC OBJECT IDENTIFIER ::= { jnxSlotQFXMInterconnect 1 } jnxQFXMInterconnectSlotHM OBJECT IDENTIFIER ::= { jnxSlotQFXMInterconnect 2 } jnxQFXMInterconnectSlotPower OBJECT IDENTIFIER ::= { jnxSlotQFXMInterconnect 3 } jnxQFXMInterconnectSlotFan OBJECT IDENTIFIER ::= { jnxSlotQFXMInterconnect 4 } jnxQFXMInterconnectSlotFPB OBJECT IDENTIFIER ::= { jnxSlotQFXMInterconnect 5 } jnxMediaCardSpaceQFXMInterconnect OBJECT IDENTIFIER ::= { jnxMediaCardSpace 91 } jnxQFXMInterconnectMediaCardSpacePIC OBJECT IDENTIFIER ::= { jnxMediaCardSpaceQFXMInterconnect 1 }
QFabric System Node Devices
jnxProductLineQFXNode OBJECT IDENTIFIER ::= { jnxProductLine 61 } jnxProductNameQFXNode OBJECT IDENTIFIER ::= { jnxProductName 61 } jnxProductModelQFXNode OBJECT IDENTIFIER ::= { jnxProductModel 61 } jnxProductVariationQFXNode OBJECT IDENTIFIER ::= { jnxProductVariation 61 } jnxProductQFX3500 OBJECT IDENTIFIER ::= { jnxProductVariationQFXNode 1 } jnxProductQFX360016Q OBJECT IDENTIFIER ::= { jnxProductVariationQFXNode 3 } jnxChassisQFXNode OBJECT IDENTIFIER ::= { jnxChassis 61 } jnxSlotQFXNode OBJECT IDENTIFIER ::= { jnxSlot 61 } jnxQFXNodeSlotFPC OBJECT IDENTIFIER ::= { jnxSlotQFXNode 1 } jnxQFXNodeSlotHM OBJECT IDENTIFIER ::= { jnxSlotQFXNode 2 } jnxQFXNodeSlotPower OBJECT IDENTIFIER ::= { jnxSlotQFXNode 3 } jnxQFXNodeSlotFan OBJECT IDENTIFIER ::= { jnxSlotQFXNode 4 } jnxQFXNodeSlotFPB OBJECT IDENTIFIER ::= { jnxSlotQFXNode 5 } jnxMediaCardSpaceQFXNode OBJECT IDENTIFIER ::= { jnxMediaCardSpace 61 } jnxQFXNodeMediaCardSpacePIC OBJECT IDENTIFIER ::= { jnxMediaCardSpaceQFXNode 1 }
See Also
Fabric Chassis MIB
The Juniper Networks enterprise-specific SNMP Fabric Chassis MIB (mib-jnx-fabric-chassis) provides hardware information about the QFabric system and its component devices in a single MIB. The Fabric Chassis MIB is based on the Juniper Networks enterprise-specific Chassis MIB that provides information for individual devices. Unlike the Chassis MIB, the Fabric Chassis MIB represents the QFabric system component devices as part of the QFabric system. Only the information from the Fabric Chassis MIB (and not from individual Chassis MIBs) is available to SNMP management clients of the QFabric system.
The Fabric Chassis MIB uses the basic information structure of the Chassis MIB, but adds another level of indexing that provides detailed information about QFabric system devices. Each physical device in a QFabric system (such as a Node device or an Interconnect device) is represented with its hardware components, including the power supply, fans, and front and rear cards.
As in other SNMP systems, the SNMP manager resides on the network management system (NMS) of the network to which the QFabric system belongs. The SNMP agent (snmpd) resides in the QFabric system Director software and is responsible for receiving and distributing all traps as well as responding to all queries from the SNMP manager. In addition, there is an SNMP subagent running in the Routing Engine of each Node group and Interconnect device. The SNMP subagent manages the information about the component device, and that information is communicated to the SNMP agent in the Director software as needed. Traps that are generated by a Node device are sent to the SNMP agent in the Director software, which in turn processes and sends them to the target IP addresses that are defined in the SNMP configuration.
Table 11 describes the tables and objects in the Fabric Chassis MIB.
Table or Object Name |
Root OID |
Description |
---|---|---|
Tables with Counterparts in the Chassis MIB | ||
jnxFabricContainersTable |
1.3.6.1.4.1.2636.3.42.2.2.2 |
Provides information about different types of containers in QFabric system devices.
|
jnxFabricContentsTable |
1.3.6.1.4.1.2636.3.42.2.2.3 |
Contains contents that are present across all devices represented in the jnxFabricDeviceTable object. This table includes all field replaceable units (FRUs) and non-FRUs for QFabric system devices.
|
jnxFabricFilledTable |
1.3.6.1.4.1.2636.3.42.2.2.4 |
Shows the status of containers in QFabric devices. The jnxFabricFilledState object represents the state of the component: (1) unknown, (2) empty, or (3) filled. Note:
The jnxFabricFilledTable object does not contain information about the Director group. |
jnxFabricOperatingTable |
1.3.6.1.4.1.2636.3.42.2.2.5 |
Represents different operating parameters for the contents that are populated in the jnxFabricContentsTable object.
The jnxFabricOperatingState object provides the state of the device: (1) unknown, (2) running, (3) ready, (4) reset, (5) runningAtFullSpeed (for fans only), (6) down, (6) off (for power supply units), or (7) standby. |
jnxFabricRedundancyTable |
1.3.6.1.4.1.2636.3.42.2.2.6 |
Represents the redundancy information that is available at different subsystem levels across the QFabric system. Information about the Routing Engines in Node devices is included, but there are no corresponding entries for Interconnect devices in this table. The jnxFabricRedundancyState object indicates the state of the subsystem: (1) unknown, (2) primary, (3) backup, or (4) disabled. Note:
Information about redundant Director devices, virtual machines (VMs) within Director groups, and Virtual Chassis devices is not available at this time. |
jnxFabricFruTable |
1.3.6.1.4.1.2636.3.42.2.2.7 |
Contains all FRUs for the QFabric system in the jnxFabricDeviceTable table. The FRUs are listed regardless of whether or not they are installed or online. The jnxFabricFruState object represents the state of the FRU, including online, offline, or empty, and so on. This table also contains information about each FRU, such as name, type, temperature, time last powered on, and time last powered off. Note:
The jnxFabricFruTable table does not include network interface cards (NICs) on Director devices. |
Table Specific to the Fabric Chassis MIB | ||
jnxFabricDeviceTable |
1.3.6.1.4.1.2636.3.42.2.2.1 |
Contains information about all devices in the QFabric system. This table organizes scalar variables represented in the Chassis MIB into a table format for the QFabric system component devices. Columns in this table include device information such as model, device alias, and serial number. The jnxFabricDeviceIndex identifies each QFabric system device (Node device, Interconnect device, and Director device). Note:
At this time, information about the Virtual Chassis is not available. Note:
The following objects are not supported:
|
Scalar Variables | ||
The following scalar variables are supported:
|
1.3.6.1.4.1.2636.3.42.2.1 |
Describe the QFabric system as a whole. Note:
The jnxFabricFirmwareRevision scalar variable is not supported at this time. |
Table 12 describes the SNMPv2 traps that are defined in the Fabric Chassis MIB.
Only SNMPv2 traps are supported on the QFabric system.
Trap Group and Name |
Root OID |
Description |
---|---|---|
jnxFabricChassisTraps group—Includes the following traps:
|
1.3.6.1.4.1.2636.4.19 |
Indicates an alarm condition. Note:
Hardware events on the Director group are detected by scanning. As a result, a trap may not be generated until up to 30 seconds after the event has occurred. Note:
The software does not distinguish between the fan removal and fan failure events on the Director group. In each case, both the jnxFabricFanFailure and jnxFabricFruFailed traps are generated. |
jnxFabricChassisOKTraps group—Includes the following traps:
|
1.3.6.1.4.1.2636.4.20 |
Indicates an alarm cleared condition. |
For more information, see the Fabric Chassis MIB at:
See Also
Monitoring RMON MIB Tables
Purpose
Monitor remote monitoring (RMON) alarm, event, and log tables.
Action
To display the RMON tables:
user@switch> show snmp rmon Alarm Index Variable description Value State 5 monitor jnxOperatingCPU.9.1.0.0 5 falling threshold Event Index Type Last Event 1 log and trap 2010-07-10 11:34:17 PDT Event Index: 1 Description: Event 1 triggered by Alarm 5, rising threshold (90) crossed, (variable: jnxOperatingCPU.9.1.0.0, value: 100) Time: 2010-07-10 11:34:07 PDT Description: Event 1 triggered by Alarm 5, falling threshold (75) crossed, (variable: jnxOperatingCPU.9.1.0.0, value: 5) Time: 2010-07-10 11:34:17 PDT
Meaning
The display shows that an alarm has been defined to monitor jnxRmon MIB object jnxOperatingCPU, which represents the CPU utilization of the Routing Engine. The alarm is configured to generate an event that sends an SNMP trap and adds an entry to the logTable in the RMON MIB. The log table shows that two occurrences of the event have been generated—one for rising above a threshold of 90 percent, and one for falling below a threshold of 75 percent.
See Also
Using the Enterprise-Specific Utility MIB to Enhance SNMP Coverage
Even though the Junos OS has built-in performance metrics and monitoring options, you might need to have customized performance metrics. To make it easier for you to monitor such customized data through a standard monitoring system, the Junos OS provides you with an enterprise-specific Utility MIB that can store such data and thus extend SNMP support for managing and monitoring the data of your choice.
The enterprise-specific Utility MIB provides you with container
objects of the following types: 32-bit counters
, 64-bit
counters
, signed integers
, unsigned integers
, and octet strings
. You can use these container MIB objects
to store the data that are otherwise not supported for SNMP operations.
You can populate data for these objects either by using CLI commands
or with the help of Op scripts and an RPC API that can invoke the
CLI commands.
The following CLI commands enable you to set and clear Utility MIB object values:
request snmp utility-mib set instance name object-type <counter | counter 64 | integer | string | unsigned integer> object-value value
request snmp utility-mib clear instance name object-type <counter | counter 64 | integer | string | unsigned integer>
The instance name
option of
the request snmp utility-mib <set | clear>
command specifies
the name of the data instance and is the main identifier of the data.
The object-type <counter | counter 64 | integer | string |
unsigned integer>
option enables you specify the object type,
and the object-value value
option
enables you to set the value of the object.
To automate the process of populating Utility MIB data, you
can use a combination of an event policy and event script. The following
examples show the configuration for an event policy to run show
system buffers
every hour and to store the show system
buffers
data in Utility MIB objects by running an event script
(check-mbufs.slax
).
Event Policy Configuration
To configure an event policy that runs the show
system buffers
command every hour and invokes check-mbufs.slax
to store the show system buffers
data into Utility MIB
objects, include the following statements at the [edit
]
hierarchy level:
event-options { generate-event { 1-HOUR time-interval 3600; } policy MBUFS { events 1-HOUR; then { event-script check-mbufs.slax; # script stored at /var/db/scripts/event/ } } event-script { file check-mbufs.slax; } }
check-mbufs.slax Script
The following example shows the check-mbufs.slax
script that is stored under /var/db/scripts/event/
:
------ script START ------ version 1.0; ns junos = "http://xml.juniper.net/junos/*/junos"; ns xnm = "http://xml.juniper.net/xnm/1.1/xnm"; ns jcs = "http://xml.juniper.net/junos/commit-scripts/1.0"; ns ext = "http://xmlsoft.org/XSLT/namespace"; match / { <op-script-results>{ var $result = jcs:invoke("get-buffer-informations"); var $rpc = <request-snmp-utility-mib-set> { <object-type> "integer"; <instance> "current-mbufs"; <object-value> $result/current-mbufs; } var $res = jcs:invoke($rpc); expr jcs:syslog("external.info", $res/..//snmp-utility-mib-results/snmp-utility-mib-result); } } ------ script END ------
You can run the following command to check the data stored in the Utility MIB as a result of the event policy and script shown in the preceding examples:
user@host> show snmp mib walk jnxUtilData ascii jnxUtilIntegerValue."current-mbufs" = 0 jnxUtilIntegerTime."current-mbufs" = 07 da 05 0c 03 14 2c 00 2d 07 00 user@caramels>
The show snmp mib walk
command is not available
on the QFabric system, but you can use external SNMP client applications
to perform this operation.
See Also
Example: Configuring SNMP
By default, SNMP is disabled on devices running Junos OS. This example describes the steps for configuring SNMP on the QFabric system.
Requirements
This example uses the following hardware and software components:
Junos OS Release 12.2
Network management system (NMS) (running the SNMP manager)
QFabric system (running the SNMP agent) with multiple Node devices
Overview
Because SNMP is disabled by default on devices running Junos
OS, you must enable SNMP on your device by including configuration
statements at the [edit snmp]
hierarchy level. At a minimum,
you must configure the community public
statement. The
community defined as public grants read-only access to MIB data to
any client.
If no clients
statement is configured, all clients
are allowed. We recommend that you always include the restrict
option to limit SNMP client access to the switch.
Topology
The network topology in this example includes an NMS, a QFabric system with four Node devices, and external SNMP servers that are configured for receiving traps.
Configuration
Procedure
CLI Quick Configuration
To quickly configure this example, copy the
following commands, paste them into a text file, remove any line breaks,
change any details necessary to match your network configuration,
and then copy and paste the commands into the CLI at the [edit]
hierarchy level.
set snmp name “snmp qfabric” description “qfabric0 switch” set snmp location “Lab 4 Row 11” contact “qfabric-admin@qfabric0” set snmp community public authorization read-only set snmp client-list list0 192.168.0.0/24 set snmp community public client-list-name list0 set snmp community public clients 192.170.0.0/24 restrict set snmp trap-group “qf-traps” destination-port 155 targets 192.168.0.100
Step-by-Step Procedure
The following example requires that you navigate various levels in the configuration hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration Mode in the Junos OS CLI User Guide .
To configure SNMP on the QFabric system:
If the name, description, location, contact, or community name contains spaces, enclose the text in quotation marks (" ").
Configure the SNMP system name:
[edit snmp] user@switch# set name “snmp qfabric”
Note:The above configured SNMP system name can be accessed:
By doing a query with the SNMPGet on policy object identifier (OID) sysName.0.
From the generic jnxSyslogTrap. To send the jnxSyslogTrap, configure the trap events at
[edit event-options policy]
hierarchy.
Specify a description.
[edit snmp] user@switch# set description “qfabric0 system”
This string is placed into the MIB II sysDescription object.
Specify the physical location of the QFabric system.
[edit snmp] user@switch# set location “Lab 4 Row 11”
This string is placed into the MIB II sysLocation object.
Specify an administrative contact for the SNMP system.
[edit snmp] user@switch# set contact “qfabric-admin@qfabric0”
This name is placed into the MIB II sysContact object.
Specify a unique SNMP community name and the read-only authorization level.
Note:The
read-write
option is not supported on the QFabric system.[edit snmp] user@switch# set community public authorization read-only
Create a client list with a set of IP addresses that can use the SNMP community.
[edit snmp] user@switch# set client-list list0 192.168.0.0/24 user@switch# set community public client-list-name list0
Specify IP addresses of clients that are restricted from using the community.
[edit snmp] user@switch# set community public clients 198.51.100.0/24 restrict
Configure a trap group, destination port, and a target to receive the SNMP traps in the trap group.
[edit snmp] user@switch# set trap-group “qf-traps” destination-port 155 targets 192.168.0.100
Note:You do not need to include the
destination-port
statement if you use the default port 162.The trap group qf-traps is configured to send traps to 192.168.0.100.
Results
From configuration mode, confirm your configuration
by entering the show
command. If the output does not display
the intended configuration, repeat the instructions in this example
to correct the configuration.
[edit] user@switch# show snmp { name "snmp qfabric"; description "qfabric0 system"; location "Lab 4 Row 11"; contact "qfabric-admin@qfabric0"; client-list list0 { 192.168.0.0/24; } community public { authorization read-only; clients { 198.51.100.0/24 restrict; } } trap-group qf-traps { destination-port 155; targets { 192.168.0.100; } } }
If you are done configuring the device, enter commit
from configuration mode.
Configuring RMON Alarms and Events
The Junos OS supports the Remote Network Monitoring (RMON) MIB (RFC 2819), which allows a management device to monitor the values of MIB objects, or variables, against configured thresholds. When the value of a variable crosses a threshold, an alarm and its corresponding event are generated. The event can be logged and can generate an SNMP trap.
To configure RMON alarms and events using the CLI, perform these tasks:
Configuring SNMP
To configure SNMP:
Configuring an Event
To configure an event:
Configuring an Alarm
To configure an alarm: