On large networks, it’s clearly not practical to manage each device manually. Administrators would have to spend large portions of their time running around the network, either physically or virtually, adjusting configurations, and collecting log entries. In this video, learn how to use the Simple Network Management Protocol to monitor and manage network devices in a centralized fashion.
- The Simple Network Management Protocol, or SNMP,…provides network administrators with a means…to centrally configure and monitor network devices.…On large networks it's clearly not practical…to manage every network device manually.…Administrators would have to spend large portions…of their time running around the network,…either physically, or virtually,…adjusting configurations and collecting log entries.…This is time consuming work…that is not particularly productive.…
SNMP automates many of these tasks,…performing the heavy lifting for administrators,…who can then spend their time doing design work…or higher level monitoring.…Let's take a look at how SNMP works.…There are three components involved…in SNMP network administration.…Managed devices are all of the network devices…around your organization.…These include routers, switches, wireless access points,…firewalls, and any other device that supports SNMP.…
The SNMP agent is a piece of software…that runs on the managed device and allows…it to communicate with the SNMP service.…
Note: This course is part of a series releasing throughout 2018. A completed learning path of the series will be available once all the courses are released.
- How IP addresses are assigned and managed
- Multilayer protocols
- VPNs and VPN concentrators
- Designing secure networks
- Firewall management techniques
- Maintaining network availability
- Software defined networking (SDN)
- Port isolation
- Network attacks
- How Wi-Fi networks function
- WPA, WPS, and propagation attacks
- Host-based network security control
Skill Level Advanced
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.