Scroll to navigation

SNMP_Session(3pm) User Contributed Perl Documentation SNMP_Session(3pm)

NAME

SNMP_Session - SNMPv1/v2 Protocol Handling

SYNOPSIS

    use SNMP_Session;
    $session = SNMP_Session->open ($host, $community, $port)
        or die "couldn't open SNMP session to $host";
    if ($session->get_request_response ($oid1, $oid2, ...)) {
        ($bindings) = $session->decode_get_response ($session->{pdu_buffer});
        while ($bindings ne '') {
            ($binding,$bindings) = decode_sequence ($bindings);
            ($oid,$value) = decode_by_template ($binding, "%O%@");
            print pretty_print ($oid)," => ", pretty_print ($value), "\n";
        }
    } else {
        die "No response from agent on $host";
    }

VARIABLES

The "default_..." variables all specify default values that are used for "SNMP_Session" objects when no other value is specified. These values can be overridden on a per-session basis, for example by passing additional arguments to the constructor.

$default_max_repetitions - default value for "maxRepetitions".

This specifies how many table rows are requested in "getBulk" requests. Used when walking tables using "getBulk" (only available in SNMPv2(c) and later). If this is too small, then a table walk will need unnecessarily many request/response exchanges. If it is too big, the agent may compute many variables after the end of the table. It is recommended to set this explicitly for each table walk by using "map_table_4()".

$default_avoid_negative_request_ids - default value for "avoid_negative_request_ids".

Set this to non-zero if you have agents that have trouble with negative request IDs, and don't forget to complain to your agent vendor. According to the spec (RFC 1905), the request-id is an "Integer32", i.e. its range is from -(2^31) to (2^31)-1. However, some agents erroneously encode the response ID as an unsigned, which prevents this code from matching such responses to requests.

$default_use_16bit_request_ids - default value for "use_16bit_request_ids".

Set this to non-zero if you have agents that use 16bit request IDs, and don't forget to complain to your agent vendor.

$errmsg - error message from last failed operation.

When they encounter errors, the routines in this module will generally return "undef") and leave an informative error message in $errmsg).

$suppress_warnings - whether warnings should be suppressed.

If this variable is zero, as is the default, this code will output informative error messages whenever it encounters an error. Set this to a non-zero value if you want to suppress these messages. In any case, the last error message can be found in $errmsg.

METHODS in package SNMP_Session

The abstract class "SNMP_Session" defines objects that can be used to communicate with SNMP entities. It has methods to send requests to and receive responses from an agent.

Two instantiable subclasses are defined: "SNMPv1_Session" implements SNMPv1 (RFC 1157) functionality "SNMPv2c_Session" implements community-based SNMPv2 (RFC 3410-3417).

open() - create an SNMP session object

    $session = SNMP_Session->open
      ($host, $community, $port,
       $max_pdu_len, $local_port, $max_repetitions,
       $local_host, $ipv4only);

The calling and return conventions are identical to "SNMPv1_Session::open()".

timeout() - return timeout value.

Initial timeout, in seconds, to wait for a response PDU after a request is sent. Note that when a request is retried, the timeout is increased by backoff (see below). The standard value is 2.0 (seconds).

retries() - number of attempts to get a reply.

Maximum number of attempts to get a reply for an SNMP request. If no response is received after timeout seconds, the request is resent and a new response awaited with a longer timeout, see the documentation on backoff below. The retries value should be at least 1, because the first attempt counts, too (the name "retries" is confusing, sorry for that).

backoff() - backoff factor.for timeout on successive retries.

Default backoff factor for "SNMP_Session" objects. This factor is used to increase the TIMEOUT every time an SNMP request is retried. The standard value is 1.0, which means the same timeout is used for all attempts.

set_timeout() - set initial timeout for session

set_retries() - set maximum number of attempts for session

set_backoff() - set backoff factor for session

Example usage:

    $session->set_backoff (1.5);

..._request_response() - Send some request and receive response.

Encodes a specific SNMP request, sends it to the destination address of the session, and waits for a matching response. If such a response is received, this function will return the size of the response, which is necessarily greater than zero.

An undefined value is returned if some error happens during encoding or sending, or if no matching response is received after the wait/retry schedule is exhausted. See the documentation on the "timeout()", "retries()", and "backoff()" methods on how the wait/retry logic works.

get_request_response() - Send "get" request and receive response.

getnext_request_response() - Send "get-next" request and receive response.

    $result = $session->get_request_response (@encoded_oids);
    $result = $session->getnext_request_response (@encoded_oids);

set_request_response() - Send "set" request and receive response.

    $result = $session->set_request_response (@encoded_pair_list);

This method takes its arguments in a different form; they are a list of pairs - references to two-element arrays - which respresent the variables to be set and the intended values, e.g.

    ([$encoded_oid_0, $encoded_value_0],
     [$encoded_oid_1, $encoded_value_1],
     [$encoded_oid_2, $encoded_value_2], ...)

trap_request_send() - send SNMPv1 Trap.

    $result = $session->trap_request_send ($ent, $gent, $gen, $spec, $dt, @pairs);

v2_trap_request_send() - send SNMPv2 Trap.

    $result = $session->v2_trap_request_send ($trap_oid, $dt, @pairs);

map_table() - traverse an SNMP table.

    $result = $session->map_table ([$col0, $col1, ...], $mapfn);

This will call the provided function (&$mapfn) once for each row of the table defined by the column OIDs $col0, $col1... If the session can handle SNMPv2 operations, "get-bulk" will be used to traverse the table. Otherwise, "get-next" will be used.

If the first argument is a list of n columns, the mapping function will be called with n+1 arguments. The first argument will be the row index, i.e. the list of sub-IDs that was appended to the provided column OIDs for this row. Note that the row index will be represented as a string, using dot-separated numerical OID notation.

The remaining arguments to the mapping function will be the values of each column at the current index. It is possible that the table has "holes", i.e. that for a given row index, not all columns have a value. For columns with no value at the current row index, "undef" will be passed to the mapping function.

If an error is encountered at any point during the table traversal, this method will return undef and leave an error message in $errmsg (which is also written out unless $suppress_warnings is non-zero).

Otherwise, the function will return the number of rows traversed, i.e. the number of times that the mapping function has been called.

map_table_4() - traverse an SNMP table with more control.

map_table_start_end() - traverse an SNMP table with lower/upper index limits.

    $result = $session->map_table_start_end ($columns, $mapfn,
        $start, $end, $max_repetition);

Similar to "map_table_4()", except that the start and end index can be specified.

receive_trap_1() - receive message on trap socket.

This method waits until a message is received on the trap socket. If successful, it returns two values: the message that was received, and the address of the sender as a "sockaddr" structure. This address can be passed to "getnameinfo()" to convert it to readable output.

This method doesn't check whether the message actually encodes a trap or anything else - the caller should use "decode_trap_request()" to find out.

receive_trap() - receive message on trap socket (deprecated version).

This function is identical to "receive_trap_1()", except that it returns the sender address as three (formerly two) separate values: The host IP address, the port, and (since version 1.14) the address family. If you use this, please consider moving to "receive_trap_1()", because it is easier to process the sender address in sockaddr format, in particular in a world where IPv4 and IPv6 coexist.

decode_trap_request()

    ($community, $ent, $agent, $gen, $spec, $dt, $bindings)
      = $session->decode_trap_request ($trap);

Given a message such as one returned as the first return value from "receive_trap_1()" or "receive_trap()", try to decode it as some notification PDU. The code can handle SNMPv1 and SNMPv2 traps as well as SNMPv2 INFORMs, although it fails to distinguish traps from informs, which makes it hard to handle informs correctly (they should be acknowledged).

The $ent, $agent, $gen, $spec, and $dt values will only be defined for SNMPv1 traps. For SNMPv2 traps and informs, some of this information will be encoded as bindings.

METHODS in package SNMPv1_Session

open() - create an SNMPv1 session object

    $session = SNMPv1_Session->open
      ($host, $community, $port,
       $max_pdu_len, $local_port, $max_repetitions,
       $local_host, $ipv4only);

Note that all arguments except for $host are optional. The $host can be specified either as a hostname or as a numeric address. Numeric IPv6 addresses must be enclosed in square brackets []

$community defaults to "public".

$port defaults to 161, the standard UDP port to send SNMP requests to.

$max_pdu_len defaults to 8000.

$local_port can be specified if a specific local port is desired, for example because of firewall rules for the response packets. If none is specified, the operating system will choose a random port.

$max_repetitions is the maximum number of repetitions requested in "get-bulk" requests. It is only relevant in SNMPv2(c) and later.

$local_host can be used to specify a specific address/interface. It is useful on hosts that have multiple addresses if a specific address should be used, for example because of firewall rules.

If $ipv4only is either not present or non-zero, then an IPv4-only socket will be used. This is also the case if the system only supports IPv4. Otherwise, an IPv6 socket is created. IPv6 sockets support both IPv6 and IPv4 requests and responses.

open_trap_session() - create a session for receiving SNMP traps.

    $session = open_trap_session ($port, $ipv4only);

$port defaults to 162, the standard UDP port that SNMP notifications are sent to.

If $ipv4only is either not present or non-zero, then an IPv4-only socket will be used. This is also the case if the system only supports IPv4. Otherwise, an IPv6 socket is created. IPv6 sockets can receive messages over both IPv6 and IPv4.

METHODS in package SNMPv2c_Session

open() - create an SNMPv2(c) session object

    $session = SNMPv2c_Session->open
      ($host, $community, $port,
       $max_pdu_len, $local_port, $max_repetitions,
       $local_host, $ipv4only);

The calling and return conventions are identical to "SNMPv1_Session::open()", except that this returns a session object that supports SNMPv2 operations.

EXAMPLES

The basic usage of these routines works like this:

 use BER;
 use SNMP_Session;
 
 # Set $host to the name of the host whose SNMP agent you want
 # to talk to.  Set $community to the community name under
 # which you want to talk to the agent. Set port to the UDP
 # port on which the agent listens (usually 161).
 
 $session = SNMP_Session->open ($host, $community, $port)
     or die "couldn't open SNMP session to $host";
 
 # Set $oid1, $oid2... to the BER-encoded OIDs of the MIB
 # variables you want to get.
 
 if ($session->get_request_response ($oid1, $oid2, ...)) {
     ($bindings) = $session->decode_get_response ($session->{pdu_buffer});
 
     while ($bindings ne '') {
        ($binding,$bindings) = decode_sequence ($bindings);
        ($oid,$value) = decode_by_template ($binding, "%O%@");
        print pretty_print ($oid)," => ", pretty_print ($value), "\n";
     }
 } else {
     die "No response from agent on $host";
 }

Encoding OIDs

In order to BER-encode OIDs, you can use the function BER::encode_oid. It takes (a vector of) numeric subids as an argument. For example,

 use BER;
 encode_oid (1, 3, 6, 1, 2, 1, 1, 1, 0)

will return the BER-encoded OID for the sysDescr.0 (1.3.6.1.2.1.1.1.0) instance of MIB-2.

Decoding the results

When "get_request_response()" returns success, you must decode the response PDU from the remote agent. The function "decode_get_response()" can be used to do this. It takes a "get-response" PDU, checks its syntax and returns the bindings part of the PDU. This is where the remote agent actually returns the values of the variables in your query.

You should iterate over the individual bindings in this bindings part and extract the value for each variable. In the example above, the returned bindings are simply printed using the "BER::pretty_print()" function.

For better readability of the OIDs, you can also use the following idiom, where the %pretty_oids hash maps BER-encoded numerical OIDs to symbolic OIDs. Note that this simple-minded mapping only works for response OIDs that exactly match known OIDs, so it's unsuitable for table walking (where the response OIDs include an additional row index).

 %ugly_oids = qw(sysDescr.0     1.3.6.1.2.1.1.1.0
                sysContact.0    1.3.6.1.2.1.1.4.0);
 foreach (keys %ugly_oids) {
     $ugly_oids{$_} = encode_oid (split (/\./, $ugly_oids{$_}));
     $pretty_oids{$ugly_oids{$_}} = $_;
 }
 ...
 if ($session->get_request_response ($ugly_oids{'sysDescr.0'},
                                    $ugly_oids{'sysContact.0'})) {
     ($bindings) = $session->decode_get_response ($session->{pdu_buffer});
     while ($bindings ne '') {
        ($binding,$bindings) = decode_sequence ($bindings);
        ($oid,$value) = decode_by_template ($binding, "%O%@");
        print $pretty_oids{$oid}," => ",
              pretty_print ($value), "\n";
     }
 } ...

Set Requests

Set requests are generated much like "get" or "getNext" requests are, with the exception that you have to specify not just OIDs, but also the values the variables should be set to. Every binding is passed as a reference to a two-element array, the first element being the encoded OID and the second one the encoded value. See the "test/set-test.pl" script for an example, in particular the subroutine "snmpset".

Walking Tables

Beginning with version 0.57 of "SNMP_Session.pm", there is API support for walking tables. The "map_table()" method can be used for this as follows:

 sub walk_function ($$$) {
   my ($index, $val1, $val3) = @_;
   ...
 }
 
 ...
 $columns = [$base_oid1, $base_oid3];
 $n_rows = $session->map_table ($columns, \&walk_function);

The columns argument must be a reference to a list of OIDs for table columns sharing the same index. The method will traverse the table and call the walk_function for each row. The arguments for these calls will be:

1. the row index as a partial OID in dotted notation, e.g. 1.3, or 10.0.1.34.
2. the values of the requested table columns in that row, in BER-encoded form. If you want to use the standard "pretty_print()" subroutine to decode the values, you can use the following idiom:
  grep (defined $_ && ($_=pretty_print $_), ($val1, $val3));
    

Walking Tables With "get-bulk"

Since version 0.67, "SNMP_Session" uses a different "get_table" implementation for "SNMPv2c_Session"s. This version uses the ``powerful "get-bulk" operator'' to retrieve many table rows with each request. In general, this will make table walking much faster under SNMPv2c, especially when round-trip times to the agent are long.

There is one difficulty, however: With "get-bulk", a management application can specify the maximum number of rows to return in a single response. "SNMP_Session.pm" provides a new function, "map_table_4", in which this "maxRepetitions" value can be specified explicitly.

For maximum efficiency, it should be set to a value that is one greater than the number of rows in the table. If it is smaller, then "map_table()" will use more request/response cycles than necessary; if it is bigger, the agent will have to compute variable bindings beyond the end of the table (which "map_table()" will throw away).

Of course it is usually impossible to know the size of the table in advance. If you don't specify "maxRepetitions" when walking a table, then "map_table()" will use a per-session default ("$session->default_max_repetitions"). The default value for this default is 12.

If you walk a table multiple times, and the size of the table is relatively stable, you should use the return value of "map_table()" (which is the number of rows it has encountered) to compute the next value of "maxRepetitions". Remember to add one so that "map_table()" notices when the table is finished!

Note that for really big tables, this doesn't make a big difference, since the table won't fit in a single response packet anyway.

Sending Traps

To send a trap, you have to open an SNMP session to the trap receiver. Usually this is a process listening to UDP port 162 on a network management station. Then you can use the "trap_request_send()" method to encode and send SNMPv1 traps. There is no way to find out whether the trap was actually received at the management station - SNMP traps are fundamentally unreliable.

When constructing an SNMPv1 trap, you must provide

  • the "enterprise" Object Identifier for the entity that generates the trap
  • your IP address
  • the generic trap type
  • the specific trap type
  • the "sysUpTime" at the time of trap generation
  • a sequence (may be empty) of variable bindings further describing the trap.

For SNMPv2 traps, you need:

  • the trap's OID
  • the "sysUpTime" at the time of trap generation
  • the bindings list as above

For SNMPv2 traps, the uptime and trap OID are encoded as bindings which are added to the front of the other bindings you provide.

Here is a short example:

 my $trap_receiver = "netman.noc";
 my $trap_community = "SNMP_Traps";
 my $trap_session = $version eq '1'
     ? SNMP_Session->open ($trap_receiver, $trap_community, 162)
     : SNMPv2c_Session->open ($trap_receiver, $trap_community, 162);
 my $myIpAddress = ...;
 my $start_time = time;
 
 ...
 
 sub link_down_trap ($$) {
   my ($if_index, $version) = @_;
   my $genericTrap = 2;         # linkDown
   my $specificTrap = 0;
   my @ifIndexOID = ( 1,3,6,1,2,1,2,2,1,1 );
   my $upTime = int ((time - $start_time) * 100.0);
   my @myOID = ( 1,3,6,1,4,1,2946,0,8,15 );
 
   warn "Sending trap failed"
     unless ($version eq '1')
        ? $trap_session->trap_request_send (encode_oid (@myOID),
                                            encode_ip_address ($myIpAddress),
                                            encode_int ($genericTrap),
                                            encode_int ($specificTrap),
                                            encode_timeticks ($upTime),
                                            [encode_oid (@ifIndex_OID,$if_index),
                                             encode_int ($if_index)],
                                            [encode_oid (@ifDescr_OID,$if_index),
                                             encode_string ("foo")])
            : $trap_session->v2_trap_request_send (\@linkDown_OID, $upTime,
                                                   [encode_oid (@ifIndex_OID,$if_index),
                                                    encode_int ($if_index)],
                                                   [encode_oid (@ifDescr_OID,$if_index),
                                                    encode_string ("foo")]);
 }

Receiving Traps

Since version 0.60, "SNMP_Session.pm" supports the receipt and decoding of SNMPv1 trap requests. Since version 0.75, SNMPv2 Trap PDUs are also recognized.

To receive traps, you have to create a special SNMP session that passively listens on the SNMP trap transport address, usually on UDP port 162. Then you can receive traps - actually, SNMPv1 traps, SNMPv2 traps, and SNMPv2 informs, using the "receive_trap_1()" method and decode them using "decode_trap_request()". The enterprise, agent, generic, specific and sysUptime return values are only defined for SNMPv1 traps. In SNMPv2 traps and informs, the equivalent information is contained in the bindings.

 my $trap_session = SNMPv1_Session->open_trap_session (162, 0)
   or die "cannot open trap session";
 my ($trap, $sender_sockaddr) = $trap_session->receive_trap_1 ()
   or die "cannot receive trap";
 my ($community, $enterprise, $agent,
     $generic, $specific, $sysUptime, $bindings)
   = $trap_session->decode_trap_request ($trap)
     or die "cannot decode trap received"
 ...
 my ($binding, $oid, $value);
 while ($bindings ne '') {
     ($binding,$bindings) = decode_sequence ($bindings);
     ($oid, $value) = decode_by_template ($binding, "%O%@");
     print BER::pretty_oid ($oid)," => ",pretty_print ($value),"\n";
 }

AUTHORS

Created by: Simon Leinen <simon.leinen@switch.ch>

Contributions and fixes by:

COPYRIGHT

Copyright (c) 1995-2009, Simon Leinen.

This program is free software; you can redistribute it under the "Artistic License 2.0" included in this distribution (file "Artistic").

2020-11-29 perl v5.32.0