Book Image

Cacti 0.8 Network Monitoring

Book Image

Cacti 0.8 Network Monitoring

Overview of this book

Cacti is a network monitoring tool that provides graphic solutions to your everyday monitoring issues. It has a wide variety of features and misusing them can mean that you are not monitoring your network as closely as you think. This book takes you through all of the key features of Cacti and shows how to use them for maximum effectiveness. This book will teach you how to use Cacti effectively to monitor your network through its web interface leaving aside all the heavy chunks of code. You will be introduced to all the features of Cacti in an easy-to-understand format. This book introduces Cacti and goes through its complete installation and setup. After a quick look, it will teach you to use Cacti's amazing graph templating and user management features. You will learn to customize graphs and make them better looking and easier to understand. It will teach you to provide the paths to any external script or command using Cacti. Then it will take you through importing and managing new templates and also customizing them. Creating users and assigning permissions to them is the next step in this book. Towards the end, you will learn to take backups and restore the system.
Table of Contents (13 chapters)

Management Information Bases (MIBs)


Each managed object has a specific characteristic. Each object/characteristic has a unique object identifier (OID) consisting of numbers separated by decimal points (that is, 1.3.6.1.4.1.311). These object identifiers naturally form a tree. The MIB associates each OID with a readable label and various other parameters related to the object. The MIB then serves as a data dictionary or code book that is used to assemble and interpret SNMP messages.

When an SNMP manager wants to know the value of an object/characteristic, such as the state of an alarm point, the system name, or the element uptime, it will assemble a GET packet that includes the OID for each object/characteristic of interest. The network element receives the request and looks up each OID in its code book (MIB), if the OID is found (the object is managed by the network element), a response packet is assembled and sent with the current value of the object/characteristic included. If the OID...