CHAPT ER
15-1
Cisco Intrusion Prevention System Sensor CLI Configuration Guide for IPS 7.2
OL-29168-01
15
Configuring SNMP
This chapter describes how to configure SNMP, and contains the following sections:
SNMP Notes and Caveats, page 15-1
Understanding SNMP, page 15-1
Configuring SNMP, page 15-2
Configuring SNMP Traps, page 15-4
Supported MIBS, page 15-6

SNMP Notes and Caveats

The following notes and caveats apply to SNMP:
To have the sensor send SNMP traps, you must also select request-snmp-trap as the event action
when you configure signatures.
MIB II is available on the sensor, but we do not support it. We know that some elements are not
correct (for example, the packet counts from the IF MIB on the sensing interfaces). While you can
use elements from MIB II, we do not guaran tee that they all provide correct information. We fully
support the other listed MIBs and their output is correct.
CISCO-PROCESS-MIB is available on the sensor, but we do not support it. We know that some
elements are not available. While you can use elements from CISCO-PROCESS-MIB, we d o not
guarantee that they all provide correct information. We fully support the other listed MIBs and their
output is correct.

Understanding SNMP

SNMP is an application layer protocol that facilitates the exchange of management information between
network devices. SNMP enables network administrators to manage network performance, find and solve
network problems, and plan for network growth.
SNMP is a simple request/response protocol. The network-management system issues a request, and
managed devices return responses. This behavior is implemented by using one of four protocol
operations: Get, GetNext, Set, and Trap.
You can configure the sensor for monitoring by SNMP. SNMP defines a standard way for network
management stations to monitor the health and status of many types of devices, including switches,
routers, and sensors.