[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Using Nagios to monitor Cisco MDS 9509 switch?

Posted on 2010-09-14
1
Medium Priority
?
1,852 Views
Last Modified: 2012-05-10
Has anyone set up Nagios to monitor a Cisco MDS 9509 SAN switch?

Any tips/recomendations?

TIA
0
Comment
Question by:someITGuy
1 Comment
 
LVL 6

Accepted Solution

by:
RobArdill earned 2000 total points
ID: 33678841
You'll need to use SNMP.

I haven't specifically used Nagios with this SAN Switch, but a good starting point is to look at the SNMP MIB files for the switch to see what stats/counters are supported. The MIBs define what counters are available. Nagios comes with it's own set of SNMP tools, but there also a few good windows based ones that you can use to browse the switch with the MIBs. http://www.wtcs.org/snmp4tpc/getif.htm. Also my favourite STG http://www.wtcs.org/informant/stg.htm which is good for verifying the counters work as expected.

Cisco MIB can be found here
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml

The ones that I can see that are relevant to your switch.
CISCO-SVC-INTERFACE-MIB
CISCO-FICON-MIB
CISCO-FCSP-MIB
CISCO-FEATURE_CONTROL-MIB
CISCO-IVR-MIB
CISCO-FDMI-MIB
CISCO-SECURE_SHELL-MIB
CISCO-FC-ROUTE-MIB

Also rather than reiterate the finer points of inserting custom Cisco  counters into Nagios, here a link with some good detail. It's for Ethernet Switches, but the same principles apply to all cisco products with SNMP support.

http://blog.barfoo.org/2009/02/13/nagios-integrating-cisco-switches/


Best of luck. Rob
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses
Course of the Month19 days, 17 hours left to enroll

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question