SNMP: What is it over there?

howto Add comments

In a discussion about discovering SNMP devices, I started to wonder why we (my company) is still screen-scraping a telnet prompt to discover what sort of hardware is “over there”.

It’s actually much easier if you’re already configuring an SNMP client:

snmpget -Ov -On -v 1 -c public 192.168.0.1 1.3.6.1.2.1.1.2.0

The responses I’ve seen so far:
.1.3.6.1.4.1.1588.* Brocade Communications (hint: privatenumber 1588 is Brocade)
(ie .1.3.6.1.4.1.1588.2.1.1.1 )
.1.3.6.1.4.1.8072.* OpenSource stack (hint: privatenumber 8072 is net-snmp)
(ie .1.3.6.1.4.1.8072.3.2.255 is reported by Apple TimeCapsule)
(ie .1.3.6.1.4.1.8072.3.2.10 is reported by Synology ds209)

The reason for this path is to see whether we can use 1.3.6.1.4.1.9.5.1.3.1.1.17 to determine product IDs (port blades) on all manufacturers, or just Cisco. Brocade doesn’t populate .1.3.6.1.4.1.9 because “9” is cisco’s privatenumber 🙁

Leave a Reply

WP Theme & Icons by N.Design Studio
Entries RSS Comments RSS Log in