Scan method SNMP
Gathers some basic SNMP informations. These are (description is slightly adapted from RFC 1213):
-
org.dod.internet.mgmt.mib-2.system.sysDescr
A textual description of the entity. This value should include the full name and version identification of the system's hardware type,
software operating-system, and networking software. It is mandatory that this only contain printable ASCII characters.
-
org.dod.internet.mgmt.mib-2.system.sysObjectID
The vendor's authoritative identification of the network management subsystem contained in the
entity. This value is allocated within the SMI enterprises subtree (1.3.6.1.4.1) and provides an
easy and unambiguous means for determining "what kind of box" is being managed.
-
org.dod.internet.mgmt.mib-2.system.sysUpTime
The time since the network management portion of the system was last re-initialized.
-
org.dod.internet.mgmt.mib-2.system.sysContact
The textual identification of the contact person for this managed node, together with information on how to contact this person.
-
org.dod.internet.mgmt.mib-2.system.sysName
An administratively-assigned name for this managed node. By convention, this is the node's fully-qualified domain name.
-
org.dod.internet.mgmt.mib-2.system.sysLocation
The physical location of this node (e.g., "telephone closet, 3rd floor").
-
org.dod.internet.mgmt.mib-2.system.sysServices
A value which indicates the set of services that this entity primarily offers.
The value is a sum. This sum initially takes the value zero, Then, for each layer, L, in the range
1 through 7, that this node performs transactions for, 2 raised to (L - 1) is added to the sum. For
example, a node which performs primarily routing functions would have a value of 4 (2^(3-1)). In
contrast, a node which is a host offering application services would have a value of 72
(2^(4-1) + 2^(7-1)). Note that in the context of the Internet suite of protocols, values should be
calculated accordingly:
- 1 physical (e.g., repeaters)
- 2 datalink/subnetwork (e.g., bridges)
- 3 internet (e.g., IP gateways)
- 4 end-to-end (e.g., IP hosts)
- 7 applications (e.g., mail relays)
For systems including OSI protocols, layers 5 and 6 may also be counted.
[
User Guide |
Scan Methods
]