SBC Gateway SNMP Reference Guide Ver 74
SBC Gateway SNMP Reference Guide Ver 74
Simple Network
Management Protocol
Version 7.4
Notice Gateway-SBC | SNMP Reference Guide
Notice
Information contained in this document is believed to be accurate and reliable at the time
of printing. However, due to ongoing product improvements and revisions, AudioCodes
cannot guarantee accuracy of printed material after the Date Published nor can it accept
responsibility for errors or omissions. Updates to this document can be downloaded from
https://www.audiocodes.com/library/technical-documents.
This document is subject to change without notice.
Date Published: January-26-2021
WEEE EU Directive
Pursuant to the WEEE EU Directive, electronic and electrical waste must not be disposed of
with unsorted waste. Please contact your local recycling authority for disposal of this product.
Customer Support
Customer technical support and services are provided by AudioCodes or by an authorized
AudioCodes Service Partner. For more information on how to buy technical support for
AudioCodes products and for contact information, please visit our website at
https://www.audiocodes.com/services-support/maintenance-and-support.
Documentation Feedback
AudioCodes continually strives to produce high quality documentation. If you have any
comments (suggestions or errors) regarding this document, please fill out the Documentation
Feedback form on our website at https://online.audiocodes.com/documentation-feedback.
Related Documentation
- ii -
Notice Gateway-SBC | SNMP Reference Guide
LTRT Description
- iii -
Content Gateway-SBC | SNMP Reference Guide
Table of Contents
1 Introduction 1
2 SNMP Overview 2
SNMP Standards and Objects 2
SNMP Message Standard 2
SNMP MIB Objects 3
SNMP Extensibility Feature 4
Supported MIBs 4
SNMP Interface Details 9
SNMP Community Names 9
Configuring Community Strings via the Web 9
Configuring Community Strings via the ini File 9
Configuring Community Strings via SNMP 10
SNMPv3 USM Users 11
Configuring SNMPv3 Users via ini File 12
Configuring SNMPv3 Users via SNMP 13
Trusted Managers 14
Configuring Trusted Managers via ini File 15
Configuring Trusted Managers via SNMP 15
SNMP Ports 16
Multiple SNMP Trap Destinations 16
Configuring Trap Managers via Host Name 17
Configuring Trap Managers via ini File 17
Configuring SNMP Engine ID 19
Configuring Trap Managers via SNMP 19
3 Carrier-Grade Alarm System 21
Active Alarm Table 21
Alarm History 21
3 Topology MIB Objects 22
Physical Entity (RFC 2737) 22
IF-MIB (RFC 2863) 22
Ethernet Interface 22
DS1 Interface 24
3 File Management 26
Downloading a File to the Device 26
Uploading and Deleting a File 26
4 SNMP Traps 28
Standard Traps 28
Proprietary Traps 28
Trap Varbinds 29
Customizing the Trap's Enterprise OID 34
- iv -
Content Gateway-SBC | SNMP Reference Guide
-v-
CHAPTER 1 Introduction Gateway-SBC | SNMP Reference Guide
1 Introduction
This document provides an overview and supplementary information on Simple Network
Management Protocol (SNMP) based management for AudioCodes session border controllers
(SBC) and media gateways (referred to in this document as device).
● The SNMP MIB manual (files) is supplied in the Software Release Package
delivered with the device.
● For a description of the device's SNMP traps (alarms and events), refer to the
SBC-Gateway SNMP Alarm Reference Guide.
● For a description of the device's performance monitoring parameters (including
SNMP), refer to the SBC-Gateway Performance Monitoring Reference Guide.
● For configuring SNMP through the web interface, see the device's User's Manual.
● For large deployments (for example, multiple devices in globally distributed
enterprise offices) that need to be managed by central personnel, it is
recommended to use AudioCodes One Voice Operations Center (OVOC). OVOC
is not included in the device's supplied package. Contact AudioCodes for more
information on its OVOC solution for large VoIP deployments.
-1-
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
2 SNMP Overview
Simple Network Management Protocol (SNMP) is a standards-based network control protocol
for managing elements in a network. The SNMP Manager, usually implemented by a third-
party Network Management System (NMS) or AudioCodes One Voice Operations Center
(OVOC), connects to an SNMP Agent (embedded on a remote Network Element (NE) to
perform network element Operation, Administration, Maintenance, and Provisioning (OAMP).
Both the SNMP Manager and the NE refer to the same database to retrieve information or
configure parameters. This database is referred to as the Management Information Base
(MIB), and is a set of statistical and control values. Apart from the standard MIBs documented
in IETF RFCs, SNMP additionally enables the use of proprietary MIBs, containing non-standard
information set (specific functionality provided by the Network Element).
Directives, issued by the SNMP Manager to an SNMP Agent, consist of the identifiers of SNMP
variables (referred to as MIB object identifiers or MIB variables) along with instructions to
either get the value for that identifier, or set the identifier to a new value (configuration). The
SNMP Agent can also send unsolicited events towards an EMS, called SNMP traps.
The definitions of MIB variables supported by a particular agent are incorporated in descriptor
files, written in Abstract Syntax Notation (ASN.1) format, made available to EMS client
programs so that they can become aware of MIB variables and their usage.
The device contains an embedded SNMP Agent supporting both general network MIBs (such
as the IP MIB), VoP-specific MIBs (such as RTP) and proprietary MIBs (acGateway, acAlarm,
acMedia, acControl, and acAnalog MIBs) enabling a deeper probe into the interworking of the
device. All supported MIB files are supplied to customers as part of the release.
■ Get Request: Specific values can be fetched via the "get" request to determine the
performance and state of the device. Typically, many different values and parameters can
-2-
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
be determined via SNMP without the overhead associated with logging into the device, or
establishing a TCP connection with the device.
■ Get Next Request: Enables the SNMP standard network managers to "walk" through all
SNMP values of a device (via the "get-next" request) to determine all names and values
that a device supports.
■ Set Request: The SNMP standard provides a action method for a device (via the "set"
request) to accomplish activities such as disabling interfaces, disconnecting users, clearing
registers, etc. This provides a way of configuring and controlling network devices via
SNMP.
■ Trap Message: The SNMP standard furnishes a mechanism for a device to "reach out" to a
network manager on their own (via the “trap" message) to notify or alert the manager of a
problem with the device. This typically requires each device on the network to be
configured to issue SNMP traps to one or more network devices that are awaiting these
traps.
The above message types are all encoded into messages referred to as "Protocol Data Units"
(PDUs) that are interchanged between SNMP devices.
■ "mgmt": Contains the standard SNMP objects usually supported (at least in part) by all
network devices.
■ "experimental" and "directory": Also defined within the "internet" root directory, are
usually devoid of any meaningful data or objects.
The "tree" structure described above is an integral part of the SNMP standard, though the
most pertinent parts of the tree are the "leaf" objects of the tree that provide actual
management data regarding the device. Generally, SNMP leaf objects can be partitioned into
two similar but slightly different types that reflect the organization of the tree structure:
■ Discrete MIB Objects: Contain one precise piece of management data. These objects are
often distinguished from "Table" items (below) by adding a “.0" (dot-zero) extension to
their names. The operator must merely know the name of the object and no other
information.
-3-
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
■ Table MIB Objects: Contain multiple pieces of management data. These objects are
distinguished from "Discrete" items (above) by requiring a "." (dot) extension to their
names that uniquely distinguishes the particular value being referenced. The "." (dot)
extension is the "instance" number of an SNMP object. For "Discrete" objects, this
instance number is zero. For "Table" objects, this instance number is the index into the
SNMP table. SNMP tables are special types of SNMP objects, which allow parallel arrays of
information to be supported. Tables are distinguished from scalar objects, such that
tables can grow without bounds. For example, SNMP defines the "ifDescr" object (as a
standard SNMP object) that indicates the text description of each interface supported by a
particular device. Since network devices can be configured with more than one interface,
this object can only be represented as an array.
By convention, SNMP objects are always grouped in an "Entry" directory, within an object with
a "Table" suffix. (The "ifDescr" object described above resides in the "ifEntry" directory
contained in the "ifTable" directory).
Typically, when a MIB is compiled into the system, the manager creates new folders or
directories that correspond to the objects. These folders or directories can typically be viewed
with a "MIB Browser", which is a traditional SNMP management tool incorporated into
virtually all network management systems.
The act of compiling the MIB allows the manager to know about the special objects supported
by the agent and access these objects as part of the standard object set.
Supported MIBs
The device contains an embedded SNMP agent supporting the MIBs listed below. A description
in HTML format for all supported MIBs can be found in the MIBs directory in the release
package.
■ Standard MIB (MIB-2): The various SNMP values in the standard MIB are defined in RFC
1213. The standard MIB includes various objects to measure and monitor IP activity, TCP
activity, UDP activity, IP routes, TCP connections, interfaces, and general system
description.
● The inetCidrRouteTable (from the standard IP-FORWARD-MIB) supports both IPv4 and
IPv6.
-4-
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
■ System MIB (under MIB-2): Standard system group: sysDescr, sysObjectID, sysUpTime,
sysContact, sysName, sysLocation, and sysServices. You can replace the value of
sysObjectID.0 with a variable value using the ini file parameter SNMPSysOid. This
parameter is polled during startup and overwrites the standard sysObjectID.
SNMPSysName is an administratively assigned name for this managed node. By
convention, this is the node's fully-qualified domain name (FQDN). If the name is
unknown, the value is the zero-length string. If the [HostName] ini file parameter is
configured, its' value overwrites the value of SNMPSysName.
■ RTP MIB: The MIB is supported according to RFC 2959. It contains objects relevant to the
RTP streams generated and terminated by the device and to the RTCP information related
to these streams.
■ Alarm MIB: IETF MIB (RFC 3877) Supported as part of the implementation of Carrier Grade
Alarms.
■ SNMP Target MIB: (RFC 2273) Allows for configuration of trap destinations and trusted
managers.
■ SNMP MIB: (RFC 3418) Allows support for the coldStart and authenticationFailure traps.
■ SNMP Framework MIB: (RFC 3411).
■ SNMP Usm MIB: (RFC 3414) Implements the user-based Security Model.
■ SNMP Vacm MIB: (RFC 3415) Implements the view-based Access Control Model.
■ SNMP Community MIB: (RFC 3584) Implements community string management.
■ ipForward MIB: (RFC 2096) Fully supported.
■ RTCP-XR: (RFC) implements the following partial support:
● The rtcpXrCallQualityTable is fully supported.
● In the rtcpXrHistoryTable, support of the RCQ objects is provided only with no more
than 3 intervals, 15 minutes long each.
◆ dsx1LoopbackConfig
◆ dsx1LineStatusChangeTrapEnable
◆ dsx1CircuitIdentifier
-5-
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
● dsx1CurrentTable
● dsx1IntervalTable
● dsx1TotalTable
● dsx1LineStatusChange trap
◆ SonetMediumLineCoding
◆ SonetMediumLineType
◆ SonetMediumCircuitIdentifier
◆ sonetMediumLoopbackConfig
◆ sonetSectionCurrentESs
◆ sonetSectionCurrentSESs
◆ sonetSectionCurrentSEFSs
◆ sonetSectionCurrentCVs
◆ sonetLineCurrentESs
◆ sonetLineCurrentSESs
◆ sonetLineCurrentCVs
◆ sonetLineCurrentUASs
● sonetSectionIntervalTable
● sonetLineIntervalTable
● sonetPathCurrentTable
● sonetPathIntervalTable
■ acPSTN MIB:
● acSonetSDHTable: currently has one entry (acSonetSDHFbrGrpMappingType) for
selecting a low path mapping type. Relevant only for PSTN applications. (Refer to the
MIB for more details.)
■ acSystem MIB:
-6-
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
■ AC-TYPES MIB: lists the known types defined by the complete product series. This is
referred to by the sysObjectID object in the MIB-II.
■ AcAnalog MIB
■ acControl MIB
■ acMedia MIB
■ acSystem MIB
■ acSysInterfaceStatusTable: supports the networking multiple interfaces feature status.
This table reflects all the device's active interfaces. The lines indices consist of both the
Entry Index and the Type Index. The table contains the following columns:
● Entry Index - related Interface index in the interface configuration table (if the table is
empty,i.e., there is only single IP address, the index appears with 0)
● Primary DNS Server IP Address - IP address of primary DNS server for this interface
● Secondary DNS Server IP Address - IP address of secondary DNS server for this
interface
■ acSysModuleTable
■ acIPMediaChannelsresourcesTable: IPMedia channels information such as Module ID and
DSP Channels Reserved
■ acPSTN MIB
■ acGateway MIB: This proprietary MIB contains objects related to configuration of the SIP
device. This MIB complements the other proprietary MIBs. The acGateway MIB includes
the following groups:
-7-
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
● ActiveAlarm: straight forward (single indexed) table listing all currently active Alarms
together with their bindings (the Alarm bindings are defined in acAlarm.
acAlarmVarbinds and also in acBoard.acTrap. acBoardTrapDefinitions. oid_1_3_6_1_
4_1_5003_9_10_1_21_2_0).
● acAlarmHistory: straight forward (single indexed) table listing all recently sent Alarms
together with their bindings (the Alarm bindings are defined in acAlarm.
acAlarmVarbinds and also in acBoard.acTrap. acBoardTrapDefinitions. oid_1_3_6_1_
4_1_5003_9_10_1_21_2_0).
● notificationLogMIB.notificationLogMIBObjects.nlmConfig.nlmConfigGlobalEntryLimit
● noti-
fic-
ationLo-
gMIB.no-
tific-
ationLo-
gMIBOb-
jects.nlmConfig.nlmConfigLogTable.nlmConfigLogEntry.nlmConfigLogEntryLimit.
The table size (i.e., number of contained alarms) can be any value between 10 and 1,000
(default is 500)100 (default is 100)
-8-
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
TrapGroup No No Yes
For detailed information on configuring community strings through the Web interface, refer to
the device's User's Manual.
The following ini file parameters are used to configure community strings:
■ SNMPREADONLYCOMMUNITYSTRING_<x> = '#######'
■ SNMPREADWRITECOMMUNITYSTRING_<x> = '#######'
-9-
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
Where <x> is a number from 0 through 4. Note that the '#' character represents any
alphanumeric character. The maximum length of the string is 19 characters that can include
only the following:
To configure community strings, the EMS must use the standard snmpCommunityMIB. To
configure the trap community string, the EMS must also use the snmpTargetMIB.
- 10 -
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
3. If v2admin is being used as the trap community string, follow the procedure to change the
trap community string. (See below.)
4. Follow the procedure above to delete a read-write community name in the row for
v2admin.
The following procedure assumes that a row already exists in the snmpCommunityTable for
the new trap community string. The trap community string can be part of the TrapGroup,
ReadGroup, or ReadWriteGroup. If the trap community string is used solely for sending traps
(recommended), then it should be made part of the TrapGroup.
Each SNMPv3 user must be associated with one of the predefined groups listed in the following
table:
- 11 -
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
The first (initial) SNMPv3 user can only be configured through a management interface
other than SNMP (i.e., Web interface, configuration ini file, or CLI). Once configured,
additional users can be configured through the SNMP interface as well.
Use the [SNMPUsers] ini file table parameter to add, modify, and delete SNMPv3 users. The
[SNMPUsers] ini table is a hidden parameter. Therefore, when you load the ini file to the device
using the Web interface, the table is not included in the generated file.
- 12 -
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
Keys can be entered in the form of a text password or in the form of a localized key in hex
format. If using a text password, then it should be at least 8 characters in length. Below is an
example showing the format of a localized key:
26:60:d8:7d:0d:4a:d6:8c:02:73:dd:22:96:a2:69:df
[ SNMPUsers ]
FORMAT SNMPUsers_Index = SNMPUsers_Username, SNMPUsers_
AuthProtocol, SNMPUsers_PrivProtocol, SNMPUsers_AuthKey, SNMPUsers_
PrivKey, SNMPUsers_Group;
SNMPUsers 0 = v3user, 0, 0, -, -, 0;
SNMPUsers 1 = v3admin1, 1, 0, myauthkey, -, 1;
SNMPUsers 2 = v3admin2, 2, 1, myauthkey, myprivkey, 1;
[ \SNMPUsers ]
■ The user v3user is set up for a security level of noAuthNoPriv(1) and is associated with
ReadGroup1.
■ The user v3admin1 is setup for a security level of authNoPriv(2), with authentication
protocol MD5. The authentication text password is “myauthkey” and the user is
associated with ReadWriteGroup2.
■ The user v3admin2 is setup for a security level of authPriv(3), with authentication protocol
SHA-1 and privacy protocol DES. The authentication text password is “myauthkey”, the
privacy text password is “myprivkey”, and the user is associated with ReadWriteGroup3.
To configure SNMPv3 users, the EMS must use the standard snmpUsmMIB and the
snmpVacmMIB.
- 13 -
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
2. Activate the row. That is, set the row status to active(1).
3. Add a row to the vacmSecurityToGroupTable for SecurityName v3user, GroupName
ReadGroup1 and SecurityModel usm(3).
A row with the same security level (noAuthNoPriv) must already exist in the
usmUserTable. (see the usmUserTable for details).
A row with the same security level (authPriv) must already exist in the usmUserTable
(see the usmUserTable for details).
Trusted Managers
By default, the SNMP agent accepts Get and Set requests from any IP address, as long as the
correct community string is used in the request. Security can be enhanced implementing
Trusted Managers. A Trusted Manager is an IP address from which the SNMP agent accepts
and processes Get and Set requests. An element management can be used to configure up to
five Trusted Managers.
- 14 -
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
The concept of Trusted Managers is considered to be a weak form of security and therefore is
not a required part of SNMPv3 security, which uses authentication and privacy. Trusted
Managers for the devices' SNMP agent are applicable only for SNMPv2c users. An exception to
this is when the community string is not the default string (‘public’/’private’), at which time
Trusted Managers are applicable for SNMPV2c users alongside SNMPv3 users.
If Trusted Managers are defined, then all community strings work from all Trusted
Managers. In other words, there is no way to associate a community string with
specific Trusted Managers.
To set the Trusted Managers table from start up, write the following in the ini file:
SNMPTRUSTEDMGR_X = D.D.D.D
Where X is any integer between 0 and 4 (0 sets the first table entry, 1 sets the second and so
on), and D is an integer between 0 and 255.
To configure Trusted Managers, the Element Management System (EMS) must use the SNMP-
COMMUNITY-MIB and snmpCommunityMIB and the snmpTargetMIB.
The following procedure assumes the following: at least one configured read-write community;
currently no Trusted Managers; TransportTag for columns for all snmpCommunityTable rows
are currently empty.
2. Add a row to the snmpTargetAddrExtTable table with these values: Name=mgr0, snm-
pTargetAddrTMask=255.255.255.255:0. The agent does not allow creation of a row in this
table unless a corresponding row exists in the snmpTargetAddrTable.
3. Set the value of the TransportTag field on each non-TrapGroup row in the
snmpCommunityTable to MGR.
The following procedure assumes the following: at least one configured read-write community;
currently one or more Trusted Managers; TransportTag for columns for all rows in the
snmpCommunityTable are currently set to MGR. This procedure must be done from one of
the existing Trusted Managers.
- 15 -
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
2. Add a row to the snmpTargetAddrExtTable table with these values: Name=mgrN, snm-
pTargetAddrTMask=255.255.255.255:0.
An alternative to the above procedure is to set the snmpTargetAddrTMask column while you
are creating other rows in the table.
The following procedure assumes the following: at least one configured read-write community;
currently two or more Trusted Managers; taglist for columns for all rows in the
snmpCommunityTable are currently set to MGR. This procedure must be done from one of
the existing trusted managers, but not the one that is being deleted.
The following procedure assumes the following: at least one configured read-write community;
currently only one Trusted Manager; taglist for columns for all rows in the
snmpCommunityTable are currently set to MGR. This procedure must be done from the final
Trusted Manager.
SNMP Ports
The SNMP Request Port is 161 and the SNMP Trap Port is 162. These port numbers for SNMP
requests and responses can be changed, by using the [SNMPPort] ini file parameter. The valid
value is any valid UDP port number. The default is 161 (recommended).
- 16 -
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
To configure the Trap Managers table, use one of the following methods:
One of the five available SNMP managers can be defined using the manager's host name (i.e.,
FQDN). This can be configured using the ini file parameter [SNMPTrapManagerHostName].
When this parameter value is defined for this trap, the device at start up tries to resolve the
host name. Once the name is resolved (i.e., the IP address is found), the resolved IP address
replaces the last entry of the trap manager table (defined by the parameter
[SNMPManagerTableIP_x]) and the last trap manager entry of snmpTargetAddrTable in the
snmpTargetMIB. The port is 162 (unless specified otherwise). The row is marked as 'used' and
the sending is 'enabled'.
When using 'host name' resolution, any changes made by the user to this row in either MIBs
are overwritten by the device when a resolving is redone (once an hour).
In the ini file, the following parameters can be set to enable or disable the sending of SNMP
traps. Multiple trap destinations can be supported on the device by setting multiple trap
destinations in the ini file.
The following is an example of entries in the ini file regarding SNMP. The device can be
configured to send to multiple trap destinations.
- 17 -
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
The ‘trap manager host name’ is configured via SNMPTrapManagerHostName. For example:
;SNMPTrapManagerHostName = 'myMananger.corp.MyCompany.com'
The same information that is configurable in the ini file can also be configured via the
acBoardMIB.
- 18 -
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
The [SNMPEngineIDString] ini file parameter configures the SNMP engine ID. The ID can be a
string of up to 36 characters. Once defined, the device must be reset for the parameter to take
effect.
The default value is 00:00:00:00:00:00:00:00:00:00:00:00 (12 Hex characters). The provided key
must be set with 12 Hex values delimited by ‘:’.
If the supplied key does not pass validation of the 12 Hex values input or it is set with the
default value, the engine ID is then generated, according to RFC 3411.
Before setting this parameter, all SNMPv3 users must be deleted, otherwise the configuration
is ignored.
When the device operates in HA mode, the SNMPEngineIDString parameter has the
same value for both active and redundant devices (i.e., system identifier). If the
devices return to Standalone mode (i.e., non- HA mode), you must configure the
parameter to a NULL value (i.e., no value) on both devices. When the devices reset to
the standalone mode, each device automatically sets this parameter to a unique value
based on its serial number (S/N).
2. If a row does not already exist for this combination of user and SecurityLevel, add a row to
the snmpTargetParamsTable with these values: Name=usm<user>, MPModel=3(SNMPv3),
SecurityModel=3 (usm), SecurityName=<user>, SecurityLevel=M, where M is either 1
(noAuthNoPriv), 2(authNoPriv) or 3(authPriv).
- 19 -
CHAPTER 2 SNMP Overview Gateway-SBC | SNMP Reference Guide
■ If this is the last trap destination associated with this user and security level, you could
also delete the appropriate row from the snmpTargetParamsTable.
■ Modify the IP address and/or port number for the appropriate row in the
snmpTargetAddrTable.
- 20 -
CHAPTER 3 Carrier-Grade Alarm System Gateway-SBC | SNMP Reference Guide
■ The device allows an EMS to determine which alarms are currently active in the device.
That is, the device maintains an active alarm table.
■ The device allows an EMS to detect lost alarms and clear notifications [sequence number
in trap, current sequence number MIB object]
■ The device allows an EMS to recover lost alarm raise and clear notifications [maintains a
log history]
■ The device sends a cold start trap to indicate that it is starting. This allows the EMS to
synchronize its view of the device's active alarms.
When the SNMP alarm traps are sent, the carrier-grade alarm system does not add or delete
alarm traps as part of the feature. This system provides the mechanism for viewing of history
and current active alarm information.
The acActiveAlarmTable is a simple, one-row per alarm table that is easy to view with a MIB
browser.
Alarm History
The device maintains a history of alarms that have been sent and traps that have been cleared
to allow an EMS to recover any lost raise or clear traps. Two views of the alarm history table
are supported by the agent:
■ acAlarmHistoryTable in the enterprise AcAlarm - a simple, one-row per alarm table, that is
easy to view with a MIB browser.
- 21 -
CHAPTER 3 Topology MIB Objects Gateway-SBC | SNMP Reference Guide
■ entityGeneral group: Describes general system attributes shared by potentially all types of
entities managed by a single agent.
■ ethernetCsmacd(6): for all Ethernet-like interfaces, regardless of speed, as per RFC 3635
■ ds1(18): DS1-MIB
■ voiceFXO(101): Voice Foreign Exchange Office
■ voiceFXS(102): Voice Foreign Exchange Station
The numbers in the brackets above refer to the IANA's interface-number.
Ethernet Interface
Table 3-1: Ethernet Interface
ifType ethernetCsmacd(6)
ifMtu 1500
- 22 -
CHAPTER 3 Topology MIB Objects Gateway-SBC | SNMP Reference Guide
- 23 -
CHAPTER 3 Topology MIB Objects Gateway-SBC | SNMP Reference Guide
DS1 Interface
ifTable Value
ifType ds1(18).
- 24 -
CHAPTER 3 Topology MIB Objects Gateway-SBC | SNMP Reference Guide
ifTable Value
ifXTable Value
- 25 -
CHAPTER 3 File Management Gateway-SBC | SNMP Reference Guide
3 File Management
SNMP supports file download, upload, and removal.
acSysActionSetActionId can be set to any value and can be used to indicate an action
performed by a certain manager.
A successful process also ends with the file name in the appropriate object under the acSysFile
subtree or in the acCASFileTable or the acAuxiliaryFiles subtree, along with the URL being
erased from the object under the acSysHTTPClient subtree.
■ acSysUploadFileURI indicates the file name and location along with the file transfer
protocol (HTTP or NFS), for example, “http:\\server\filename.txt”.
■ acSysUploadActionID is at the disposal of the manager and can be used to indicate that a
certain manager has performed the action.
■ acSysUploadActionType determines the action that occurs and triggers it off at the same
time.
- 26 -
CHAPTER 3 File Management Gateway-SBC | SNMP Reference Guide
File upload using SNMP is supported only for ini files; file removal using SNMP is
supported for all files except ini files.
- 27 -
CHAPTER 4 SNMP Traps Gateway-SBC | SNMP Reference Guide
4 SNMP Traps
This section provides an overview of the SNMP traps.
For a description of the device's SNMP traps (alarms and events), refer to the SBC-
Gateway SNMP Alarm Reference Guide.
Standard Traps
The device also supports the following standard traps:
■ authenticationFailure
■ coldStart: The device supports a cold start trap to indicate that the device is starting up.
This allows the EMS to synchronize its view of the device's active alarms. In fact, two
different traps are sent at start-up:
■ linkDown
■ linkup
■ entConfigChange
■ dsx1LineStatusChange (Applicable only to Digital Series)
Proprietary Traps
This section provides information on proprietary SNMP traps supported by the device. There is
a separation between traps that are alarms and traps that are not (i.e., events or logs). All
traps have the same structure made up of the same 16 varbinds (Variable Binding), i.e.,
1.3.6.1.4.1.5003.9.10.1.21.1. For a list of the varbinds, see Trap Varbinds on the next page.
The source varbind is composed of a string that details the device component from which the
trap is being sent (forwarded by the hierarchy in which it resides). For example, an alarm from
an SS7 link has the following string in its source varbind: acBoard#1/SS7#0/SS7Link#6. The SS7
link number is specified as 6 and is part of the only SS7 module in the device that is placed in
slot number 1 (in a chassis) and is the module to which this trap relates. For devices where
there are no chassis options, the slot number is always 1.
Full proprietary trap definitions and trap varbinds are found in AcBoard MIB and AcAlarm MIB.
- 28 -
CHAPTER 4 SNMP Traps Gateway-SBC | SNMP Reference Guide
All traps are sent from the SNMP port (default 161).
Trap Varbinds
Trap varbinds are sent with each proprietary SNMP trap. Refer to the AcBoard MIB for more
information on these varbinds.
■ noAlarm(0)
■ indeterminate(1)
■ warning(2)
■ minor(3)
■ major(4)
■ critical(5)
- 29 -
CHAPTER 4 SNMP Traps Gateway-SBC | SNMP Reference Guide
- 30 -
CHAPTER 4 SNMP Traps Gateway-SBC | SNMP Reference Guide
■ fileError(17)
■ fireDetected(18)
■ floodDetected(19)
■ framingError(20)
■ heatingVentCoolingSystemProblem(21)
■ humidityUnacceptable(22)
■ inputOutputDeviceError(23)
■ inputDeviceError(24)
■ lanError(25)
■ leakDetected(26)
■ localNodeTransmissionError(27)
■ lossOfFrame(28)
■ lossOfSignal(29)
■ materialSupplyExhausted(30)
■ multiplexerProblem(31)
■ outOfMemory(32)
■ ouputDeviceError(33)
■ performanceDegraded(34)
■ powerProblem(35)
■ pressureUnacceptable(36)
■ processorProblem(37)
■ pumpFailure(38)
■ queueSizeExceeded(39)
■ receiveFailure(40)
■ receiverFailure(41)
■ remoteNodeTransmissionError(42)
■ resourceAtOrNearingCapacity(43)
■ responseTimeExecessive(44)
■ retransmissionRateExcessive(45)
■ softwareError(46)
- 31 -
CHAPTER 4 SNMP Traps Gateway-SBC | SNMP Reference Guide
■ softwareProgramAbnormallyTerminated
(47)
■ softwareProgramError(48)
■ storageCapacityProblem(49)
■ temperatureUnacceptable(50)
■ thresholdCrossed(51)
■ timingProblem(52)
■ toxicLeakDetected(53)
■ transmitFailure(54)
■ transmitterFailure(55)
■ underlyingResourceUnavailable(56)
■ versionMismatch(57)
■ authenticationFailure(58)
■ breachOfConfidentiality(59)
■ cableTamper(60)
■ delayedInformation(61)
■ denialOfService(62)
■ duplicateInformation(63)
■ informationMissing(64)
■ informationModificationDetected(65)
■ informationOutOfSequence(66)
■ intrusionDetection(67)
■ keyExpired(68)
■ nonRepudiationFailure(69)
■ outOfHoursActivity(70)
■ outOfService(71)
■ proceduralError(72)
■ unauthorizedAccessAttempt(73)
■ unexpectedInformation(74)
- 32 -
CHAPTER 4 SNMP Traps Gateway-SBC | SNMP Reference Guide
■ cleared(0)
■ indeterminate(1)
■ warning(2)
■ minor(3)
■ major(4)
■ critical(5)
- 33 -
CHAPTER 4 SNMP Traps Gateway-SBC | SNMP Reference Guide
If additional information exists in the alarm, the following are also added: Additional
Info1:/ Additional Info2:/ Additional Info3
The message severity is as follows:
Table 4-2: Message Severity
AudioCodes'
ITU Perceived Severity (SNMP Alarm’s Severity)
Syslog Severity
Critical RecoverableMsg
Major RecoverableMsg
Minor RecoverableMsg
Warning Notice
Indeterminate Notice
- 34 -
CHAPTER 4 SNMP Traps Gateway-SBC | SNMP Reference Guide
AudioCodes'
ITU Perceived Severity (SNMP Alarm’s Severity)
Syslog Severity
Cleared Notice
■ Cleared alarm:
CLEAR-ALARM: <Alarm Name>; Textual Description: <Textual Description>; Severity <Alarm
Severity>; Source <Alarm Source>; Unique ID: <Alarm Unique ID >; If exists Additional
Info1:/ Additional Info2:/ Additional Info3:
Cleared Alarms
When the device clears an alarm, it adds the prefix "Alarm cleared:" to the alarm's original text
description. For example, when an Ethernet link alarm is cleared, the following alarm
description is sent: "Alarm cleared: Ethernet link alarm. LAN port number 8 is down.".
- 35 -
CHAPTER 5 Advanced SNMP Features Gateway-SBC | SNMP Reference Guide
■ Trap source port: all traps are sent from the SNMP port (default is 161). A manager
receiving these traps can use the binding information (in the UDP layer) to traverse the
NAT back to the device. The trap destination address (port and IP) are as configured in the
snmpTargetMIB.
■ acKeepAliveTrap: this trap is designed to be a constant life signal from the device to the
manager, allowing the manager NAT traversal at all times. The acBoardTrapG-
lobalsAdditionalInfo1 varbind has the device’s serial number.
The destination port (i.e., the manager port for this trap), can be set to be different than
the port to which all other traps are sent. To do this, use the acSysSNMPKeepAliveTrapPort
object in the acSystem MIB or the KeepAliveTrapPort ini file parameter.
The Trap is instigated in three ways:
● Via an ini file parameter [SendKeepAliveTrap] = [1]. This ensures that the trap is
continuously sent. The frequency is set via the 9/10 of the
[NATBindingDefaultTimeout] parameter or MIB object acSysSTUNBindingLifeTime.
The two latter options require the STUN client be enabled (ini file parameter
[EnableSTUN]). In addition, once the acKeepAlive trap is instigated it does not stop.
■ The manager can view the NAT type in the MIB: audioCodes(5003).acProducts
(9).acBoardMibs(10).acSystem(10).acSystemStatus(2).acSysNetwork(6).acSysNAT
(2).acSysNATType(1)
■ The manager also has access to the STUN client configuration: audioCodes
(5003).acProducts(9).acBoardMibs(10).acSystem(10).acSystemConfiguration
(1).acSysNetworkConfig(3).acSysNATTraversal(6).acSysSTUN(21)
Systems
For the management of a system (a chassis with more than one type of module running), the
acSystem/acSystemChassis subtree in the acSystem MIB should be used:
- 36 -
CHAPTER 5 Advanced SNMP Features Gateway-SBC | SNMP Reference Guide
■ The first few objects are scalars that are read-only objects for the dry-contacts’ state.
■ acSysModuleTable: A table containing mostly status information that describes the
modules in the system. In addition, the table can be used to reset an entire system, reset
a redundant module or perform switchover when for devices supporting HA.
■ acSysFanTrayTable: A status-only table with the fan tray’s state. Objects in the table
indicate the specific state of the individual fans within the fan tray.
■ acSysPowerSupplyTable: A status-only table with the states of the two power supplies.
The above tables are complemented by the following alarm traps (as defined in the acBoard
MIB). For more details, see Getting Started with SNMP on page 39.
■ acFanTrayAlarm: Fault in the fan tray or fan tray missing (see Fan Tray Alarm).
■ acPowerSupplyAlarm: Fault in one of the power supply modules or power supply module
is missing (see Power Supply Alarm).
High-Availability Systems
For the management of the High Availability (HA) systems, use the acSysChassis MIB subtree
(as in the above section). The acSysModuleTable gives the HA state of the system. This
includes defining which modules are active and which are in standby mode (redundant). The
table also enables to read some of the statuses of the redundant modules (such as SW
version, HW version, temperature, license key list, etc.). Resetting the system, resetting the
redundant module, and performing switchover are performed done using this table.
Complementing the above are the following alarm traps (as defined in the acBoard MIB):
■ acSysActionAdminState: Read-write MIB object. When a GET request is sent for this
object, the agent returns the current device administrative state - determines the device's
desired operational state:
● locked (0): Shutdown the device in the time frame set by acSysAc-
tionAdminStateLockTimeout.
- 37 -
CHAPTER 5 Advanced SNMP Features Gateway-SBC | SNMP Reference Guide
- 38 -
CHAPTER 6 Getting Started with SNMP Gateway-SBC | SNMP Reference Guide
To access the device’s SNMP agent, there are a few parameters that can be configured if you
don't want to use default settings. The SNMP agent default settings include the following:
■ ini file:
SNMPPort = <x>
; where ‘x’ is the port number
■ CLI:
- 39 -
CHAPTER 6 Getting Started with SNMP Gateway-SBC | SNMP Reference Guide
In addition, you can associate a trap destination with a specific SNMPv3 USM user. Traps will
be sent to that trap destination using the SNMPv3 format and the authentication and privacy
protocol configured for that user.
SNMPMANAGERTABLEIP_x=<IP address>
SNMPMANAGERISUSED_x=1
SNMPMANAGERTRAPSENDINGENABLE_x=1
SNMPMANAGERTRAPPORT_x=162 ;(optional)
Where x is the entry index from 0 to 4
● This option also requires you to configure the DNS server IP address (in the IP
Interfaces table).
● This option results in the fifth manager being overrun by the resolved IP address.
Online changes to the Manager table will also be overrun.
■ SNMP: The trap managers are SET using the SNMPTargetMIB MIB onbject.
● To add an SNMPv2 trap destination: Add a row to the snmpTargetAddrTable with
these values:
◆ TagList=AC_TRAP
◆ Params=v2cparamsm
i. Add a row to the snmpTargetAddrTable with these values: Name=trapN, >, where
N is an unused number between 0 and 4, and <user> is the name of the SNMPv3
that this user is associated with:
TagList=AC_TRAP
Params=usm<user>
- 40 -
CHAPTER 6 Getting Started with SNMP Gateway-SBC | SNMP Reference Guide
ii. If a row does not already exist for this combination of user and SecurityLevel, add
a row to the snmpTargetParamsTable with this values:
Name=usm<user>
MPModel=3(SNMPv3)
SecurityModel=3 (usm)
SecurityName=<user>
SecurityLevel=M, where M is either 1(noAuthNoPriv), 2(authNoPriv) or 3(authPriv)
ii. If this is the last trap destination associated with this user and security level, you
can also delete the appropriate row from the snmpTargetParamsTable.
● To modify a trap destination, change the IP address and or port number for the
appropriate row in the snmpTargetAddrTable for an existing trap destination. The
same effect can be achieved by removing a row and adding a new row.
■ Web Interface: SNMP Trap Destinations table (Setup menu > Administration tab > SNMP
folder > SNMP Trap Destinations). The check box on the left indicates if the row is used.
The three columns are used to set IP address, port and enable trap sending. The SNMPv3
Users table configures trap users.
● To add a trap user: Click New, and then configure the user. The five columns include
name, authentication protocol, privacy protocol, authentication key and privacy key.
After configuring the columns, click Apply.
● To delete a row: Select the corresponding index field, and then click Delete.
■ CLI:
- 41 -
CHAPTER 6 Getting Started with SNMP Gateway-SBC | SNMP Reference Guide
● The concept of trusted managers is a weak form of security and is therefore, not a
required part of SNMPv3 security, which uses authentication and privacy.
● Trusted managers are therefore, not supported in SNMPv3 – thus they apply only
when the device is set to use SNMPv2c.
● If trusted managers are defined, then all community strings work from all trusted
managers. That is, there is no way to associate a community string with particular
trusted managers.
The configuration can be done via ini file, SNMP and Web.
● To add the first Trusted Manager: This procedure assumes that there is at least one
configured read-write community. There are currently no Trusted Managers. The
TransportTag for columns for all snmpCommunityTable rows are currently empty.
The agent does not allow creation of a row in this table unless a corresponding
row exists in the snmpTargetAddrTable.
iii. Set the value of the TransportTag field on each non-TrapGroup row in the
snmpCommunityTable to MGR.
● To add a subsequent Trusted Manager: This procedure assumes that there is at least
one configured read-write community. There are currently one or more Trusted
Managers. The TransportTag for columns for all rows in the snmpCommunityTable are
currently set to MGR. This procedure must be done from one of the existing Trusted
Managers.
- 42 -
CHAPTER 6 Getting Started with SNMP Gateway-SBC | SNMP Reference Guide
● To delete a Trusted Manager (not the final one): This procedure assumes that there is
at least one configured read-write community. There are currently two or more
Trusted Managers. The taglist for columns for all rows in the snmpCommunityTable
are currently set to MGR. This procedure must be done from one of the existing
trusted managers, but not the one that is being deleted. Remove the appropriate row
from the snmpTargetAddrTable; The change takes effect immediately. The deleted
trusted manager cannot access the device. The agent automatically removes the row
in the snmpTargetAddrExtTable.
● To delete the final Trusted Manager: This procedure assumes that there is at least one
configured read-write community. There is currently only one Trusted Manager. The
taglist for columns for all rows in the snmpCommunityTable are currently set to MGR.
This procedure must be done from the final Trusted Manager.
i. Set the value of the TransportTag field on each row in the snmpCommunityTable
to the empty string.
ii. Remove the appropriate row from the snmpTargetAddrTable; The change takes
effect immediately. All managers can now access the device. The agent
automatically removes the row in the snmpTargetAddrExtTable.
■ Web interface: SNMP Trusted Managers table (Setup menu > Administration tab > SNMP
folder > SNMP Trusted Managers). Click the Apply button for applying your configuration.
Use the check boxes for deleting.
■ CLI:
■ Configuration and status MIBs – in the acBoardMibs subtree. The different MIB
modules are grouped according to different virtual modules of the device. In general, the
division is as follows (a more detailed breakdown of the MIBs is discussed below):
● acGateway MIB: SIP control protocol specific objects. This MIB’s structure is unlike the
other configuration and status MIBs.
● acMedia MIB: DSP and media related objects. This MIB includes the configuration and
status of DSP, voice, modem, fax, RTP/RTCP related objects.
● acControl MIB: mostly MEGACO and MGCP CP related objects. A number of objects
are also related to SIP. The MIB is divided into subtrees that are common to both
- 43 -
CHAPTER 6 Getting Started with SNMP Gateway-SBC | SNMP Reference Guide
MEGACO and MGCP (amongst these are also the SIP relevant objects) and subtrees
that are specific to the different CPs.
● acAnalog MIB: all objects in this MIB are related only to the configuration, status and
line testing or resetting of analog interfaces..
● acPSTN MIB: configuration and status of trunk related objects only. Most of the MIB
objects are trunk specific. .
● acSystem MIB: configuration and status of a wide range of general objects along with
chassis related objects and a variety of actions that can be instigated.
The structure of the different MIBs is similar, depending on the subtree in which they reside.
The MIBs in the acBoardMibs subtree have a very similar structure (except the acBoard and
acGateway MIBs). Each MIB can be made up of four major subtrees:
■ Configuration subtree: mostly read-write objects, tables and scalars. The relevant
module’s configuration is done via these objects.
■ Status subtree: read-only objects, tables and scalars. Module status is collected by these
objects.
■ Action subtree: read-write objects that are used to instigate actions on the device (such as
reset, save configuration, and so on) and read-only objects used to receive the actions’
results.
■ Chassis subtree (in acSystem MIB only): read-write and read-only objects related to chassis
control and management (this includes, fan trays, power supply modules, PSTN IF
modules, etc’).
The acBoard MIB contains some deprecated objects and current proprietary trap definitions.
The acGateway MIB contains only the configuration subtree which in return is divided into
common, SIP and H323 subtrees. The H323 subtree is mostly deprecated or obsolete.
- 44 -
CHAPTER 6 Getting Started with SNMP Gateway-SBC | SNMP Reference Guide
■ coldStart
■ authenticationFailure
■ linkDown
■ linkup
■ dsx1LineStatusChange
■ rtcpXrVoipThresholdViolation
■ dsx3LineStatusChange
■ entConfigChange
This subsection describes the device’s configuration so that traps are sent out to user-defined
managers under SNMPv2c or SNMPv3. It continues with an explanation on the ‘carrier grade
alarm’ abilities and usage.
Device Configuration
For a device to send traps to specified managers, the most basic configuration are the trap
targets. More advanced configuration includes the Trap Community String or traps over
SNMPv3.
■ Destination IP address and port (see Basic SNMP Configuration Setup on page 39)
■ Trap Community String: The default Trap Community String is ‘trapuser’. There is only 1
for the entire device.
● Web: SNMP Community Settings page (Setup menu > Administration tab > SNMP
folder > SNMP Community Settings). Use the Apply button to apply your
configuration. You can’t delete the Trap Community String, only modify its value.
● CLI:
- 45 -
CHAPTER 6 Getting Started with SNMP Gateway-SBC | SNMP Reference Guide
■ SNMPv3 Settings: When using SNMPv3 settings it is important to note that by default the
trap configuration remains such that the traps are sent out in SNMPv2c mode. To have
traps sent out in SNMPv3, you can use either ini file or SNMP:
● INI file: amongst the SNMPv3 users ensure that you also define a trap user (the value
of 2 in the SNMPUsers_Group indicates the trap user). For example: you can have the
SNMP users table defined with a read-write user, ‘rwmd5des’ with MD5 authentication
and DES privacy, along with a trap user, ‘tmd5no’ with SHA authentication and DES
privacy:
[ SNMPUsers ]
FORMAT SNMPUsers_Index = SNMPUsers_Username, SNMPUsers_
AuthProtocol, SNMPUsers_PrivProtocol, SNMPUsers_AuthKey,
SNMPUsers_PrivKey, SNMPUsers_Group;
SNMPUsers 1 = rwmd5des, 1, 1, myauthkey, myprivkey, 1;
SNMPUsers 2 = tshades, 2, 1, myauthkey, myprivkey, 2
[ \SNMPUsers ]
● If you define a trap user only, the device runs in SNMPv3 mode but will not be
accessible as there are no defined read-write or even read-only users.
● If you define non-default community strings (SNMPv2c), you need to access the
device via SNMPv2c.
Along with this configuration, you also need to associate the trap targets
(managers) with the user:
SNMPMANAGERTRAPUSER_x=tshades
● SNMP: change snmpTargetAddrParams object to the user of your choice adding the
letters ‘usm’ as prefix (ensure it’s a trap user). For example, the ‘tshades’ user should
be added as ‘usmtshades’.
- 46 -
CHAPTER 6 Getting Started with SNMP Gateway-SBC | SNMP Reference Guide
■ The device allows a manager to determine which alarms are currently active in the device.
That is, the device maintains an active alarm table.
■ The device allows a manager to detect lost alarms and clear notifications (sequence
number in trap, current sequence number MIB object).
■ The device allows a manager to recover lost alarm raise and clear notifications (maintains a
log history).
■ The device sends a cold start trap to indicate that it is starting. This allows the manager to
synchronize its view of the device's active alarms.
When SNMP alarm traps are sent, the carrier-grade alarm system does not add or delete alarm
traps as part of the feature. This system provides the mechanism for viewing history and
current active alarm information.
■ Active Alarm Table: The device maintains an active alarm table to allow an OVOC to
determine which alarms are currently active in the device. Two views of the active alarm
table are supported by the agent:
■ Alarm History: The device maintains a history of alarms that have been sent and traps that
have been cleared to allow an OVOC to recover any lost sent or cleared traps. Two views of
the alarm history table are supported by the agent:
- 47 -
CHAPTER 6 Getting Started with SNMP Gateway-SBC | SNMP Reference Guide
- 48 -
International Headquarters
1 Hayarden Street,
Airport City
Tel: +972-3-976-4000
Fax: +972-3-976-4040
AudioCodes Inc.
200 Cottontail Lane
Suite A101E
Somerset NJ 08873
Tel: +1-732-469-0880
Fax: +1-732-469-2298
©2021 AudioCodes Ltd. All rights reserved. AudioCodes, AC, HD VoIP, HD VoIP Sounds Better, IPme-
dia, Mediant, MediaPack, What’s Inside Matters, OSN, SmartTAP, User Management Pack, VMAS,
VoIPerfect, VoIPerfectHD, Your Gateway To VoIP, 3GX, VocaNom, AudioCodes One Voice, AudioCodes
Meeting Insights, AudioCodes Room Experience and CloudBond are trademarks or registered trade-
marks of AudioCodes Limited. All other products or trademarks are property of their respective own-
ers. Product specifications are subject to change without notice.
Document #: LTRT-52466