[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference azur::mcc

Title:DECmcc user notes file. Does not replace IPMT.
Notice:Use IPMT for problems. Newsletter location in note 6187
Moderator:TAEC::BEROUD
Created:Mon Aug 21 1989
Last Modified:Wed Jun 04 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:6497
Total number of notes:27359

3303.0. "Help on Proxy Agents needed" by FRAIS::64917::SYSTEM (Information, that's all I need...) Fri Jul 03 1992 10:40

Hi all,

my name is Joerg Maass, and I work as a network management specialist for DS
OSS-NIS in Frankfurt, Germany.

For a RFP, I need information about SNMP proxy agents we sell and/or support. I
know that there is a file describing these out there in the network, but
unfortunately I have no idea where to look for it.

Can you help me out? It's pretty urgent, and any help is greatly appreciated.


Thanx in advance



Josch

(Crossposted in Network Management, European Network Management, MCC and DNT)
T.RTitleUserPersonal
Name
DateLines
3303.1One for 802.5 managementGOYA::GONZALEZMon Jul 06 1992 07:437
Hi

There is a Proteon/Token Ring Proxy Agent (SPD 38.47.00) that we sell and
support. It runs on MS-DOS and helps managing 802.5 stuff using SNMP from any
SNMP system including DECmcc

Luis
3303.2Thanks for your reply! Are there any more?FRAIS::64917::SYSTEMInformation, that's all I need...Tue Jul 07 1992 10:020
3303.3DECagent 90ANDRIS::putninsTue Jul 07 1992 18:1323
LeNAC is currently in field test with an upcoming product, the DECagent
90.  This is an SNMP agent that can be used either stand-alone or in a
DEChub.  It acts as a proxy agent for the following devices (which
normally only speak MOP or RBMS):
	DECserver 90L and 90L+
	DECrepeater 90C and 90T
	DECbridge 90

As usual with the DEChub, you need the bridge to manage repeaters in
the same hub.  For more information on DEChub 90 management products
including draft SPDs and manuals see EMDS::MANAGEMENT:READ_ME.TXT.

By the way, the DECmcc SNMP AM does not implement agent support very
well.  The problem is that SNMP uses community strings as
"subaddresses" for "downstream" devices, but the SNMP AM treats
community strings as passwords which have to be entered each time you
issue a directive.  There is no way to put an icon on the map that
represents an entity downstream from the agent, because the SNMP AM
requires each entity instance to have a unique IP address.  You really
need the ability to associate the pair {IP address, community name}
with an individual icon.

	- Andy
3303.4Using community name to identify "downstream" agents is not its intended use...DANZO::CARRTue Jul 07 1992 19:4412
Andy,

	The community name string is meant to be used for message 
authentication, not as you state, for "subaddresses" for "downstream" devices.
DEChub 90 (and others) have chosen to use it for this purpose because the SNMP 
protocol provides no specific mechanism for handling proxy.

	I will agree however, that DECmcc (and other generic snmp managers) 
dosen't handle proxy agents very well.


Dan
3303.5The RFC specifies thisANDRIS::putninsTue Jul 07 1992 20:5995
The community name mechanism is actually intended for both
authentication and "subaddressing".  The RFC defining SNMP includes an
example that illustrates exactly this.  In fact, the specification
allows an even more complex application, namely, the use of community
name to identify portions of the MIB, where these portions are disjoint
subtrees.  From RFC 1098, pages 7-9:
			.
			.
			.
   A pairing of an SNMP agent with some arbitrary set of SNMP
   application entities is called an SNMP community.  Each SNMP
   community is named by a string of octets, that is called the
   community name for said community.
			.
			.
			.
   For any network element, a subset of objects in the MIB that pertain
   to that element is called a SNMP MIB view.  Note that the names of
   the object types represented in a SNMP MIB view need not belong to a
   single sub-tree of the object type name space.
			.
			.
			.
   For every SNMP access policy, if the network element on which the
   SNMP agent for the specified SNMP community resides is not that to
   which the MIB view for the specified profile pertains, then that
   policy is called a SNMP proxy access policy. The SNMP agent
   associated with a proxy access policy is called a SNMP proxy agent.
   While careless definition of proxy access policies can result in
   management loops, prudent definition of proxy policies is useful in
   at least two ways:

      (1)  It permits the monitoring and control of network elements
           which are otherwise not addressable using the management
           protocol and the transport protocol.  That is, a proxy
           agent may provide a protocol conversion function allowing
           a management station to apply a consistent management
           framework to all network elements, including devices such
           as modems, multiplexors, and other devices which support
           different management frameworks.

      (2)  It potentially shields network elements from elaborate
           access control policies.  For example, a proxy agent may
           implement sophisticated access control whereby diverse
           subsets of variables within the MIB are made accessible
           to different management stations without increasing the
           complexity of the network element.

   By way of example, Figure 1 illustrates the relationship between
   management stations, proxy agents, and management agents.  In this
   example, the proxy agent is envisioned to be a normal Internet
   Network Operations Center (INOC) of some administrative domain which
   has a standard managerial relationship with a set of management
   agents.

   +------------------+       +----------------+      +----------------+
   |  Region #1 INOC  |       |Region #2 INOC  |      |PC in Region #3 |
   |                  |       |                |      |                |
   |Domain=Region #1  |       |Domain=Region #2|      |Domain=Region #3|
   |CPU=super-mini-1  |       |CPU=super-mini-1|      |CPU=Clone-1     |
   |PCommunity=pub    |       |PCommunity=pub  |      |PCommunity=slate|
   |                  |       |                |      |                |
   +------------------+       +----------------+      +----------------+
          /|\                      /|\                     /|\
           |                        |                       |
           |                        |                       |
           |                       \|/                      |
           |               +-----------------+              |
           +-------------->| Region #3 INOC  |<-------------+
                           |                 |
                           |Domain=Region #3 |
                           |CPU=super-mini-2 |
                           |         slate   |
                           |PCommunity=pub,  |
                           |DCommunity=secret|
           +-------------->|                 |<-------------+
           |               +-----------------+              |
           |                       /|\                      |
           |                        |                       |
           |                        |                       |
          \|/                      \|/                     \|/
   +-----------------+     +-----------------+       +-----------------+
   |Domain=Region#3  |     |Domain=Region#3  |       |Domain=Region#3  |
   |CPU=router-1     |     |CPU=mainframe-1  |       |CPU=modem-1      |
   |DCommunity=secret|     |DCommunity=secret|       |DCommunity=secret|
   +-----------------+     +-----------------+       +-----------------+


   Domain:  the administrative domain of the element
   PCommunity:  the name of a community utilizing a proxy agent
   DCommunity:  the name of a direct community


                                 Figure 1