-
Notifications
You must be signed in to change notification settings - Fork 7
/
Copy pathsnmp_helper.py
140 lines (106 loc) · 4.69 KB
/
snmp_helper.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
from __future__ import print_function
from pysnmp.entity.rfc3413.oneliner import cmdgen
def snmp_get_oid_v3(snmp_device, snmp_user, oid='.1.3.6.1.2.1.1.1.0', auth_proto='sha',
encrypt_proto='aes128', display_errors=True):
'''
Retrieve the given OID
Default OID is MIB2, sysDescr
snmp_device is a tuple = (name_or_IP, snmp_port)
snmp_user is a tuple = (user_name, auth_key, encrypt_key)
Defaults to SHA1-AES128 for authentication + encryption
auth_proto can be 'sha' or 'md5' or 'none'
encrypt_proto can be 'aes128', 'aes192', 'aes256', '3des', 'des', or 'none'
From PySNMP manuals: http://pysnmp.sourceforge.net/docs/current/security-configuration.html
Optional authProtocol parameter may be used to specify non-default hash function algorithm.
Possible values include:
usmHMACMD5AuthProtocol -- MD5-based authentication protocol
usmHMACSHAAuthProtocol -- SHA-based authentication protocol
usmNoAuthProtocol -- no authentication to use (default)
Optional privProtocol parameter may be used to specify non-default ciphering algorithm.
Possible values include:
usmDESPrivProtocol -- DES-based encryption protocol
usmAesCfb128Protocol -- AES128-based encryption protocol (RFC3826)
usm3DESEDEPrivProtocol -- triple DES-based encryption protocol (Extended Security Options)
usmAesCfb192Protocol -- AES192-based encryption protocol (Extended Security Options)
usmAesCfb256Protocol -- AES256-based encryption protocol (Extended Security Options)
usmNoPrivProtocol -- no encryption to use (default)
'''
# unpack snmp_user
a_user, auth_key, encrypt_key = snmp_user
auth_proto_map = {
'sha': cmdgen.usmHMACSHAAuthProtocol,
'md5': cmdgen.usmHMACMD5AuthProtocol,
'none': cmdgen.usmNoAuthProtocol
}
if auth_proto in auth_proto_map.keys():
auth_protocol = auth_proto_map[auth_proto]
else:
raise ValueError("Invalid authentication protocol specified: %s" % auth_proto)
encrypt_proto_map = {
'des': cmdgen.usmDESPrivProtocol,
'3des': cmdgen.usm3DESEDEPrivProtocol,
'aes128': cmdgen.usmAesCfb128Protocol,
'aes192': cmdgen.usmAesCfb192Protocol,
'aes256': cmdgen.usmAesCfb256Protocol,
'none': cmdgen.usmNoPrivProtocol,
}
if encrypt_proto in encrypt_proto_map.keys():
encrypt_protocol = encrypt_proto_map[encrypt_proto]
else:
raise ValueError("Invalid encryption protocol specified: %s" % encrypt_proto)
# Create a PYSNMP cmdgen object
cmd_gen = cmdgen.CommandGenerator()
(error_detected, error_status, error_index, snmp_data) = cmd_gen.getCmd(
cmdgen.UsmUserData(a_user, auth_key, encrypt_key,
authProtocol=auth_protocol,
privProtocol=encrypt_protocol, ),
cmdgen.UdpTransportTarget(snmp_device),
oid,
lookupNames=True, lookupValues=True
)
if not error_detected:
return snmp_data
else:
if display_errors:
print('ERROR DETECTED: ')
print(' %-16s %-60s' % ('error_message', error_detected))
print(' %-16s %-60s' % ('error_status', error_status))
print(' %-16s %-60s' % ('error_index', error_index))
return None
def snmp_get_oid(a_device, oid='.1.3.6.1.2.1.1.1.0', display_errors=False):
'''
Retrieve the given OID
Default OID is MIB2, sysDescr
a_device is a tuple = (a_host, community_string, snmp_port)
'''
a_host, community_string, snmp_port = a_device
snmp_target = (a_host, snmp_port)
# Create a PYSNMP cmdgen object
cmd_gen = cmdgen.CommandGenerator()
(error_detected, error_status, error_index, snmp_data) = cmd_gen.getCmd(
cmdgen.CommunityData(community_string),
cmdgen.UdpTransportTarget(snmp_target),
oid,
lookupNames=True, lookupValues=True
)
if not error_detected:
return snmp_data
else:
if display_errors:
print('ERROR DETECTED: ')
print(' %-16s %-60s' % ('error_message', error_detected))
print(' %-16s %-60s' % ('error_status', error_status))
print(' %-16s %-60s' % ('error_index', error_index))
return None
def snmp_extract(snmp_data):
'''
Unwrap the SNMP response data and return in a readable format
Assumes only a single list element is returned
'''
if len(snmp_data) > 1:
raise ValueError("snmp_extract only allows a single element")
if len(snmp_data) == 0:
return None
else:
# Unwrap the data which is returned as a tuple wrapped in a list
return snmp_data[0][1].prettyPrint()