Solved

Where are SNMP OID's defined

Posted on 2014-09-09
6
248 Views
Last Modified: 2014-09-17
Is there a way to look up an OID and see what value it is supposed to return?  I don't see how a MIB file maps a friendly name to an OID without any reference to the OID in the MIB file.  I am properly misunderstanding how this all works.

Example:
JVM-MANAGEMENT-MIB::jvmMemoryHeapUsed <maps-to> 1.3.6.1.4.1.42.2.145.3.163.1.1.2, but how would one know this??

If someone could please explain, that would be great!
0
Comment
Question by:lconnell
  • 3
  • 3
6 Comments
 
LVL 79

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 40314276
1.3.6.1.4.1.42.2.145.3.163.1.1.2

From JVM-MANAGEMENT-MIB - JSR 163 Final Release 1.0
-- Enterprise OIDs
--        internet          OBJECT IDENTIFIER ::= { iso(1) org(3) dod(6) 1 }
--        private           OBJECT IDENTIFIER ::= { internet 4 }
--        enterprises       OBJECT IDENTIFIER ::= { private 1 }
      sun                OBJECT IDENTIFIER ::= { enterprises 42 }
      jmgt              OBJECT IDENTIFIER ::= { sun products(2) 145 }
      -- experimental      OBJECT IDENTIFIER ::= { jmgt 1 }
        standard          OBJECT IDENTIFIER ::= { jmgt 3 }sample breakdown
0
 
LVL 79

Expert Comment

by:David Johnson, CD, MVP
ID: 40314293
0
 

Author Comment

by:lconnell
ID: 40319163
Excellent, thank you very much.

Where does this come from?
3.163.1.1.2

Also, how would I access the value jvmOSName? Would it be like this... MANAGEMENT-MIB::jvmOSGroup::jvmOSName ??

jvmOSGroup OBJECT-GROUP
    OBJECTS {
             jvmOSName,
           jvmOSArch,
           jvmOSVersion,
           jvmOSProcessorCount
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 

Author Comment

by:lconnell
ID: 40323021
Can someone explain where the "3.163.1.1.2" comes from? Where is that defined in the MIB?
0
 
LVL 79

Assisted Solution

by:David Johnson, CD, MVP
David Johnson, CD, MVP earned 500 total points
ID: 40323233
VALUE standard [UNIVERSAL 6] OBJECT IDENTIFIER
    ::= 1.3.6.1.4.1.42.2.145.3 from MIB Browser http://www.mibble.org/

you can peruse the source if you want more.. also if you open the mib in a text editor you can find what you can use and the values returned.
0
 

Author Comment

by:lconnell
ID: 40329413
Hi,

I understand where 1.3.6.1.4.1.42.2.145 come from as you explained that very clearly. Am I misunderstanding an important concept here? I am assuming that the MIB: JVM would define the 3.163.1.1.2 section which must point to a specific piece of information.

How would I know what the OID 3.163.1.1.2 is referencing?

After looking at this site: IPMonitor I can see what I was expecting, a mapping between OID and the name.

So I see where I can see the mapping, but it's only possible using a MIB browser?

Thanks!
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Stuck in INIT/DROTHER 2 26
BGP Network restrictions 6 37
Penetration Testing home based work 3 75
Web resource - Man pages for SUSE Enterprise Linux 11 1 26
I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question