what is the use of proxy in SNMP.Does it require only when
the network has snmpv1 and snmpv2.
Answers were Sorted based on User's Feedback
Answer / babuji periasubbramaniam
SNMP Proxy agent requires only when network has SNMP V1 and
V2 agents. SNMP V1 supports Get, GetNext, Set and trap.
SNMP V2 supports Get, GetBulk, set, trap and Inform. When
SNMP V2 Network management Service wants to get data from
SNMP V1 device, it sends GetBulk message to Proxy agent.
Proxy agent will translate the GetBulk request to GetNext
request in order to get data from SNMP V1 agent
Is This Answer Correct ? | 5 Yes | 0 No |
Answer / j.farooq
Proxy can be defined as an intermediately device,
which plays the role of an agent in the Context of SNMP.It
works as a Virtual LAN to the Devices Which are not having
an Ethernet Inerface,Like MODEMS and Multiplexers.
By using the SNMPPROXY we can Know the STATUS of
these(MODEMS etc) devices.
When an Agent performs PROXY role,it acs on the behalf of
one or more other nodes.A NETWORK MANAGER that wishes ti
obtain the information from or control the node
communicates with the proxy agent.The proxy agent then
translates the MANAGER's request to a form appropriate for
the arget sysem and uses an appropriate nework management
protocol to communicate with the target system.
Is This Answer Correct ? | 1 Yes | 0 No |
What is FSB?
how much does a Blu-ray have memory
Net working is What ?
what is destination translation? what will happen if we don't use VTP?
MEMORY THAT IS PAGED OUT TO THE HARDWARE IS KNOWN AS
Paid surveys , Online Jobs , Part time Jobs.
Multiple Choice The devices found in datalink layer are Router Bridge NIC Repeater Memory
Multiple Choice Which of the following protocols are in TCP/IP protocol suite? FTP PPP HTTP IP SMTP
what are the different betwork software?
what is heterogeneous network?
What are advantages and disadvantages of combining the session presentation application layer in the osi model into one single application layer in internet layer?
How SNMP communicates to Managed Devices and Do it takes help of other protocols?