Fact-checked by Grok 2 weeks ago

RMON

Remote Network Monitoring (RMON) is a set of (MIB) modules standardized by the (IETF) for use with the (SNMP) to enable remote monitoring and management of network traffic and performance. Developed initially in the early , RMON allows network probes or embedded agents in devices like switches and routers to collect detailed statistics on segments, supporting proactive fault detection, , and diagnostics without constant oversight from a central management station. The foundational RMON standard, known as RMON1 and defined in RFC 2819 (published May 2000, obsoleting RFC 1757), focuses on monitoring at the media layer (primarily Ethernet) and includes nine functional groups: statistics for interface-level metrics like packets and errors; history for time-series data sampling; alarm for threshold-based alerts; host and hostTopN for per-host traffic analysis; matrix for conversation statistics between device pairs; filter and packet capture for selective packet analysis; and event for logging and notifications. This enables offline operation, value-added data processing (e.g., top talkers reports), and multi-manager support, reducing bandwidth needs for management traffic. Building on RMON1, RMON2 (defined in RFC 4502, published May 2006, obsoleting RFC 2021) extends monitoring to higher protocol layers, including network and application levels, through groups such as protocol directory for identifying protocols; address mapping for linking MAC to network addresses; network layer host/matrix for IP-level traffic; application layer host/matrix for application-specific stats; protocol distribution for traffic breakdowns; user history for custom sampling; and probe configuration for management. RMON2 supports advanced features like packet decoding, variable-length filtering, and high-capacity reporting, facilitating comprehensive analysis of end-to-end network behavior. Additional extensions include SMON (Switch Monitoring, RFC 2613, June 1999), which adapts RMON for switched networks by addressing VLANs and , and other specialized MIBs like RMON (RFC 1513, obsoleted) and ATM-RMON for environments. Overall, the RMON family provides a scalable framework for network administrators to gather actionable insights, detect anomalies, and optimize performance across diverse topologies.

Introduction

Definition and Purpose

Remote Network Monitoring (RMON) is a networking that defines a set of (MIB) modules as extensions to the (SNMP), enabling the remote monitoring of operational statistics and performance. These MIBs provide managed objects for configuring and querying remote devices, commonly known as probes, which can be dedicated stand-alone devices or agents in network equipment, for observing and analyzing without requiring direct intervention from a central management station. The primary purposes of RMON include gathering detailed statistics on network traffic, proactively detecting potential issues such as high utilization rates or error conditions, and facilitating the remote management of local area network (LAN) segments. By embedding monitoring capabilities directly into network devices or standalone probes, RMON allows for continuous data collection and diagnostics, supporting efficient oversight of distributed environments where real-time visibility is essential. RMON offers significant benefits over traditional approaches, including reduced network overhead through minimized polling requirements, as probes can store and process locally even during periods of intermittent with the station. This enables offline analysis for long-term trending and historical review, while enhancing in large, geographically dispersed networks by distributing the load. RMON was developed to address key limitations in basic SNMP polling mechanisms, particularly the inefficiency of constant communication in scenarios where stations cannot maintain ongoing contact with remote sites.

Relation to SNMP

Remote Network Monitoring (RMON) serves as an extension to the Simple Network Management Protocol (SNMP) Management Information Base (MIB), specifically designed for SNMPv1 and SNMPv2 environments to enable detailed remote monitoring of network traffic. It defines a set of managed objects that conform to the Structure of Management Information (SMI) for SNMPv2, allowing network management stations to access monitoring data through standard SNMP operations such as GET requests for retrieving statistics and SET requests for configuring monitoring parameters. This integration positions RMON within the broader SNMP framework, where it augments the standard MIB-II with specialized objects for proactive network diagnostics without altering the core SNMP protocol. A key aspect of RMON's relation to SNMP lies in its decentralization of monitoring responsibilities. Traditional SNMP relies on management stations polling agents frequently, which can consume significant on wide-area . In contrast, RMON probes function as intelligent SNMP agents that perform local , aggregation, and , thereby offloading from the central manager and minimizing network traffic. This approach allows probes to maintain historical data and perform threshold-based analysis independently, with management stations querying the probe's only when needed via SNMP GET operations. RMON objects are organized under a dedicated branch in the SNMP MIB tree, with the root OID for RMON being 1.3.6.1.2.1.16 (rmon), subdivided into specific subtrees for groups like (1.3.6.1.2.1.16.1) and events (1.3.6.1.2.1.16.9). This hierarchical structure ensures compatibility with SNMP's system, enabling precise addressing of monitoring elements such as counters for packet types or alarm thresholds. Furthermore, RMON enhances SNMP's synchronous polling model by incorporating asynchronous reporting through SNMP traps. While SNMP typically uses polling to retrieve at intervals, RMON's and groups generate traps to notify managers of significant occurrences, such as violations, without requiring queries. This hybrid mechanism improves responsiveness in distributed environments, as traps are sent via SNMP's notification framework to designated destinations, balancing efficiency with timely alerts.

History and Development

Origins and Evolution

The development of Remote Network Monitoring (RMON) emerged in the late 1980s amid the rapid expansion of enterprise networks, where the Simple Network Management Protocol (SNMP) proved inadequate for efficient monitoring of remote local area networks (LANs). SNMP, standardized in 1990, relied heavily on periodic polling from a central management station, which generated significant network overhead and delayed detection of issues in distributed environments with growing traffic volumes. RMON addressed these polling inefficiencies by introducing autonomous agents, or probes, capable of local data collection and storage, thereby reducing the need for constant manager-initiated queries and enabling proactive, offline monitoring even during intermittent connectivity. This shift was driven by the demands of increasingly complex LAN infrastructures, allowing for historical trend analysis and immediate fault reporting without overwhelming the network. Initial efforts within the (IETF) began under the broader SNMP framework but quickly formed the dedicated Remote Network Monitoring Working Group, culminating in the publication of RMON1 as RFC 1271 in November 1991 (later obsoleted by RFC 1757 in 1995). RMON1 focused on MAC-layer tailored to prevalent LAN technologies of the era, including Ethernet and , providing standardized (MIB) objects for statistics, history, alarms, hosts, and traffic matrices specific to these media types. The design emphasized dedicated probe resources to deliver value-added insights, such as preemptive problem detection and enhanced reporting, which SNMP alone could not achieve efficiently in remote segments. By the mid-1990s, the limitations of RMON1 in handling multi-protocol environments and higher-layer protocols became evident as networks evolved toward internetworked systems supporting diverse applications. The IETF RMON extended the standard with RMON2, published as RFC 2021 in January 1997, to incorporate network-layer and application-layer monitoring capabilities. This evolution introduced features like protocol directories for extensible multi-protocol support, address mapping, and user-defined history collections, addressing the needs of interconnected LANs where traffic spanned OSI layers 3 through 7. While retaining compatibility with RMON1's MAC-layer focus on Ethernet and foundations, RMON2 broadened the scope to facilitate comprehensive analysis in emerging internetworked settings.

Key Milestones

The development of Remote Network Monitoring (RMON) began with the publication of RFC 1271 in November 1991, which defined the initial (MIB) for RMON1, focusing on Ethernet capabilities using SNMP. This specification introduced key groups for statistics, history, alarms, hosts, and events to enable remote analysis of traffic. In September 1993, RFC 1513 was published, defining extensions to the RMON1 MIB. In February 1995, RFC 1757 was released, obsoleting RFC 1271 and updating the RMON1 to incorporate improvements in structure and interoperability while maintaining the core Ethernet-focused monitoring features. Concurrently, from 1995 to 1997, the IETF advanced RMON capabilities with the development of RMON2, culminating in the publication of RFC 2021 in January 1997, which extended monitoring to upper layers (3 through 7) for distribution, , and application-level analysis. In June 1999, RFC 2613 introduced SMON as an extension to the RMON family, specifically tailored for switched networks, adding support for VLAN statistics, port copying, and filtering to address limitations in shared-media environments. This was followed in May 2000 by RFC 2819, which obsoleted RFC 1757 and formalized RMON1 as an (STD 59) by converting the MIB to SMIv2 format without altering its semantics. August 2003 marked the release of 3577, an informational document providing an overview of the evolving RMON family of modules, including RMON1, RMON2, and extensions like SMON, to guide implementers on their interrelations and deployment. Further refinements came in May 2006 with 4502, which updated the RMON2 by adding high-capacity counters, deprecating obsolete objects, and improving compliance with SMIv2 for better performance in modern networks. After 2010, RMON saw no major new publications or version releases by 2025, with advancements limited to minor enhancements and broader with SNMPv3 for enhanced features such as and in RMON probe communications.

Core Concepts

RMON Probes and Architecture

RMON probes serve as dedicated devices or software agents that collect and store traffic data directly on specific network segments, enabling proactive analysis without constant reliance on a central . These probes operate independently, capturing packets in or through other techniques to monitor local traffic comprehensively. By performing data collection at the edge, probes reduce the need for continuous polling from remote managers, supporting offline operation and minimizing usage on wide-area links. The architecture of RMON centers on a distributed model where a central network management station (NMS) interacts with one or more probes using the (SNMP) to retrieve aggregated information. Probes function as SNMP agents, exposing a (MIB) that allows the NMS to configure monitoring parameters and poll for statistics. This design emphasizes local intelligence: probes handle raw packet processing on-site, applying filters to select relevant traffic and computing summaries to avoid transmitting voluminous raw data across the network. Multiple probes can coexist, each focused on a distinct segment, with the NMS coordinating oversight for enterprise-wide visibility. Data flow in RMON begins with probes intercepting packets at the monitored , where they apply configurable filters—such as or protocol-based criteria—to isolate pertinent traffic. Filtered packets then feed into statistical computations, generating metrics like packet counts, error rates, or traffic matrices, which are stored locally in tables for historical retention. Upon request or when predefined thresholds are exceeded, probes transmit condensed summaries or asynchronous traps to the NMS via SNMP, ensuring timely alerts while conserving resources. The flow of monitoring data from the probe to the NMS, using SNMP's bidirectional request-response mechanism for polling and asynchronous traps for notifications, optimizes efficiency in bandwidth-constrained environments. Probes manifest in various forms to suit deployment needs: standalone units, which are self-contained appliances connected via a or mirror port for isolated ; embedded agents integrated into switches, routers, or hubs, leveraging the device's existing for cost-effective ; and software-based agents running on general-purpose servers or endpoints, offering flexibility for virtualized or host-centric environments. Each type maintains the core RMON functionality but varies in scalability and resource demands, with probes typically providing the highest performance for high-traffic segments.

Monitoring Groups Overview

The Remote Monitoring (RMON) (MIB) employs a modular, group-based to organize functions, where each group comprises a collection of related objects dedicated to specific tasks such as and . This structure enables RMON agents, typically embedded in network probes or switches, to collect and store monitoring data independently of a central , supporting offline operation and reduced network traffic. Common group purposes include statistics collection for real-time counters of packets, octets, and errors on network interfaces; historical trending to capture periodic samples of these metrics over time; thresholding via alarms to detect deviations from baseline performance; and event logging to record and notify occurrences of significant conditions, thereby facilitating fault detection and performance optimization. These groups collectively enable proactive by providing insights into traffic patterns, utilization, and anomalies without constant polling from a manager. Inter-group relationships enhance the efficiency of monitoring, for instance, where alarm groups monitor variables derived from statistics and trigger corresponding events upon threshold breaches, and history groups sample data directly from ongoing statistics to build temporal trends. This interconnected approach allows for correlated analysis, such as linking a spike in errors (from statistics) to an alarm event and its historical context. Implementation flexibility is a core feature of the RMON MIB, with all groups designated as optional to accommodate varying resource constraints and deployment needs; however, foundational groups like statistics and history typically form the basis for essential monitoring capabilities, while others such as alarms and events can be added for advanced fault management. Probes implementing RMON leverage this modularity to support multiple managers through shared resources, identified via ownership strings in object configurations.

RMON1 Specification

Primary Groups

The primary groups of RMON1 form the essential foundation for MAC-layer network monitoring, enabling probes to collect, store, and respond to basic traffic statistics without constant manager intervention. These groups—Statistics, History, Alarm, and Event—focus on interface-level metrics and threshold-based alerting, supporting efficient remote analysis of Ethernet segments as defined in RFC 2819. The Statistics Group maintains real-time counters for each monitored Ethernet interface, capturing key MAC-layer metrics to assess traffic patterns and errors. Core objects in the etherStatsTable include etherStatsOctets for total bytes transmitted, etherStatsPkts for total packets, etherStatsBroadcastPkts and etherStatsMulticastPkts for broadcast and multicast traffic, etherStatsCollisions for collision events, and etherStatsCRCAlignErrors for frames with cyclic redundancy check or alignment issues. These counters increment continuously, allowing managers to query current values via SNMP for immediate diagnostics, such as identifying high-error links or broadcast storms. The History Group extends the Statistics Group by periodically sampling and archiving data over time, creating a time-series for . Through the historyControlTable, managers configure sampling via objects like historyControlDataSource (specifying the ) and historyControlInterval (settable from 1 to 3600 seconds), with up to 96 buckets per control for storage. The resulting etherHistoryTable stores sampled values, including etherHistoryOctets, etherHistoryPkts, and etherHistoryUtilization (as a of theoretical maximum ), enabling retrospective views of utilization fluctuations without retaining full raw statistics. The Alarm Group provides proactive monitoring by evaluating variables against configurable thresholds, generating notifications for anomalies. The alarmTable defines each alarm with objects such as alarmVariable (the monitored object, e.g., from or ), alarmInterval (sampling period in seconds), alarmSampleType (absolute value or delta change), alarmStartupAlarm (rising, falling, or both), alarmRisingThreshold, and alarmFallingThreshold. is implemented via the difference between rising and falling thresholds to prevent rapid oscillations (flapping) in alerts, ensuring stable operation for metrics like packet counts or error rates. The Event Group handles the logging and notification of alarms, maintaining a record of significant occurrences for auditing and response. The eventTable configures events with objects like eventDescription (text summary), eventType (none, log, SNMP trap, or log-and-trap), eventCommunity (SNMP community string for trap ), and eventLastTimeSent ( of last occurrence). When triggered, events populate the logTable with details such as logTimeStamp, logDescription, and logStatus, supporting both local storage (up to 4 entries per event by default) and remote SNMP traps for real-time manager alerts. This group ensures alarms translate into actionable, historical events without overwhelming the network.

Ethernet-Specific Features

The Ethernet-specific features in RMON1 extend beyond aggregate interface statistics to provide granular, entity-focused monitoring of individual hosts, conversations, and packet-level behaviors on shared Ethernet segments. These groups enable detailed analysis of patterns, detection, and targeted packet , which are particularly valuable in Ethernet environments where broadcast domains allow probes to observe all . By leveraging addresses for identification, these features support up to implementation-dependent limits, often around 32,000 hosts in practical deployments, though constrained by probe . The Host Group collects per-host statistics for devices discovered through source and destination MAC addresses in valid Ethernet frames, tracking up to thousands of hosts depending on the probe's resources. Key metrics include packets sent and received (hostOutPkts, hostInPkts), octets transmitted (hostOutOctets, hostInOctets), and error types such as CRC alignment errors or undersized packets. The group maintains three tables: the hostControlTable for configuring monitoring parameters like sampling intervals; the hostTable for current statistics; and the hostTimeTable for historical data snapshots at specific intervals, allowing managers to analyze trends in host behavior over time. This enables identification of high-traffic or erroneous hosts without requiring centralized polling of each device. Building on the Host Group, the HostTopN Group generates reports on the top N hosts ranked by configurable metrics, such as packet or octet rates, over a defined sampling period (e.g., minutes to hours). It uses the hostTopNControlTable to specify parameters like the number of top hosts (N), duration, and metric type, producing the hostTopNTable with ranked entries including host MAC addresses and corresponding rates (e.g., hostTopNInOctets). This group facilitates quick identification of bandwidth consumers or error sources on Ethernet networks by offloading computation to the probe, reducing management station overhead. The Matrix Group provides conversation-level statistics between pairs of MAC addresses, capturing bidirectional traffic flows on the Ethernet segment to reveal communication patterns. It includes the matrixControlTable for control settings, the matrixSDTable for source-to-destination metrics (e.g., matrixSDPkts, matrixSDOctets, matrixSDErrors), and the matrixDSTable for the reverse direction. Due to memory constraints, the group prioritizes recent conversations, aging out older entries, which supports analysis of active interactions but limits historical depth. For more precise traffic analysis, the Filter and Packet Capture Groups work in tandem to match and sample Ethernet packets based on customizable criteria. The Filter Group defines Boolean expressions via the filterTable, evaluating packet attributes like status bits (e.g., good/bad, length errors, CRC errors), offsets, and data patterns up to 64 bytes; results feed into the channelTable for counting matches (channelMatches). The Packet Capture Group then stores qualifying packets in circular buffers managed by the bufferControlTable, with the captureBufferTable holding details like packet length, timestamps, and status; triggers can include buffer full or match thresholds, enabling targeted captures for debugging issues like fragments or oversized frames. These groups allow probes to filter noise and focus on relevant Ethernet traffic without overwhelming storage.

RMON2 Extensions

Higher-Layer Monitoring

RMON2 introduces higher-layer monitoring capabilities that extend beyond the MAC-layer focus of RMON1, enabling analysis of , transport, and application-layer s across multiple segments. This shift allows network managers to gain visibility into protocol distributions and mappings without being limited to single-segment Ethernet statistics, facilitating more comprehensive and . The Protocol Directory Group maintains a configurable of protocols that the RMON2 probe can recognize and decode, assigning unique identifiers to protocols such as , , and HTTP, along with their subtypes and parent-child relationships. This group supports extensibility by permitting the addition or deletion of entries, ensuring the probe can adapt to evolving network environments. Key objects in the protocolDirTable, including protocolDirLocalIndex for identification and protocolDirType for layer specification, enable precise classification up to the , forming the foundation for higher-layer statistics collection in other groups. Complementing this, the Protocol Distribution Group aggregates traffic statistics by , counting packets and octets for each identified across all monitored interfaces or segments. It provides bucketing of data at various layers, offering insights into application-level usage patterns, such as the volume of HTTP versus FTP traffic. Through objects like protocolDistControlDataSource for setup and protocolDistStatsOctets for metrics, this group delivers protocol-specific visibility essential for and in multi-protocol networks. The Address Mapping Group correlates network-layer addresses, such as addresses, with their corresponding addresses and the interfaces on which they were observed, supporting end-to-end tracking of conversations spanning multiple segments. This mapping aids in identifying the physical locations of higher-layer endpoints, which is crucial for diagnosing issues like address resolution failures. Core objects include addressMapNetworkAddress for the higher-layer address and addressMapPhysicalAddress for the mapping, updated dynamically as traffic is observed. The Host Group (alHost) tracks traffic at the application layer, maintaining counters for packets and octets associated with each discovered application-layer address or instance across monitored segments. It provides breakdowns by application types, such as HTTP or SMTP, enabling analysis of end-user application usage. Controls similar to the nlHost group allow configuration of sampling and resource limits. The Application Layer Matrix Groups, comprising alMatrixSD and alMatrixDS tables, capture conversations between pairs of application-layer addresses, recording packets and octets for traffic exchanged between specific application endpoints, segmented by . This supports detailed analysis of application-to-application interactions, with configurable sampling and filters. Finally, the User History Group allows customization of historical sampling by collecting time-series data on user-specified variables from across protocol layers, extending the concept of RMON1's history groups to higher-layer metrics. Network managers can define sampling intervals and variables, such as protocol-specific counters, to track trends like application response times or utilization over time. Objects such as usrHistoryObjectVariable for variable selection and usrHistoryAbsValue for stored samples enable flexible, probe-based trending without requiring constant polling from a central manager.

Additional Groups

RMON2 introduces several additional groups that extend the functionality of RMON1's core groups, enabling more granular analysis across multiple network layers and segments for comprehensive monitoring in distributed environments. These enhancements build upon the foundational statistics, history, alarm, host, hostTopN, and matrix groups from RMON1 by incorporating network-layer addressing and protocol-specific breakdowns, while adding capabilities for advanced filtering, user-defined alarms, and remote probe management. The extended host group, known as the network layer host group (nlHost), augments RMON1's host statistics by tracking at the network layer, such as addresses, rather than just addresses. It maintains counters for packets and octets sent from and received by each discovered network-layer address across supported protocols, as defined in the protocol directory table. For instance, this allows monitoring of per- host activity, including breakdowns by protocol types like or , with controls for sampling intervals and maximum table entries to manage resource usage on the probe. The group is controlled via the host control table (nlHostControlTable), which supports multiple instances for different interfaces or time periods. The groups in RMON2, comprising the network layer source-destination (nlMatrixSD) and destination-source (nlMatrixDS) tables, extend the RMON1 by capturing conversations between pairs of network-layer es, such as IP-to-IP flows. Each entry records packets and octets for exchanged between specific pairs, segmented by , enabling of per-IP conversations and utilization across segments. Controls in the control table (nlMatrixControlTable) allow configuration of sampling rates, maximum dimensions (up to 1024x1024 pairs), and filters to focus on relevant network-layer interactions. Additionally, top N reporting for these tables (via nlMatrixTopNControlTable) generates sorted lists of the highest- network-layer pairs over configurable durations, facilitating identification of dominant flows. Enhancements to the and packet capture groups in RMON2 multi-layer packet through channel-based configurations, allowing filters to operate at offsets from protocol headers for precise matching across layers. The (filterTable) now includes data offset and length parameters to inspect fields like addresses or ports, while the (channelTable) defines multiple capture channels with associated buffers. Packet capture buffers are expanded to hold up to 10 packets per channel (configurable), with optional decoding for captured data, enabling targeted collection of higher-layer traffic without overwhelming storage. This is particularly useful for protocol-specific issues in segmented networks. The group enables remote of the RMON probe itself, including mappings of physical interfaces to monitored segments and of owner strings for . It includes objects for operational parameters like enable/disable, capabilities via TFTP, and settings for . This group, though deprecated due to limited implementations, ensures probes can be dynamically adjusted in multi-segment deployments without physical , supporting owner-based granularity for multiple administrators.

Applications and Implementations

Use Cases in Network Management

Remote Monitoring (RMON) enables proactive fault detection by allowing network probes to continuously collect and analyze , such as error rates and utilization, without requiring constant intervention from a central station. This preemptive approach identifies potential issues like broadcast storms—excessive broadcast that can degrade —through the of broadcast packet counters in the statistics group, triggering alarms when thresholds are exceeded to prevent user-impacting outages. In capacity planning, RMON's history group provides periodic snapshots of network metrics, including utilization and collision rates, enabling administrators to analyze trends over time and forecast bandwidth needs for infrastructure upgrades. For instance, long-term historical data can reveal patterns of increasing traffic loads, supporting decisions on scaling network resources before saturation occurs. RMON2 extends security monitoring capabilities by facilitating anomaly detection through packet capture and protocol distribution analysis, identifying unusual traffic patterns such as unexpected protocols or high volumes indicative of attacks. In DoS scenarios, RMON statistics on packet sizes and counts can be polled via SNMP and processed with machine learning algorithms like artificial neural networks, achieving high detection accuracy and low false positives for real-time threat identification. For troubleshooting in enterprise LANs, the group generates reports ranking the top hosts by metrics like transmitted packets or bytes, quickly isolating bandwidth-intensive devices or "top talkers" contributing to congestion. Similarly, the group tracks conversation statistics between host pairs, highlighting problematic interactions such as those with excessive errors or discards, which aids in diagnosing root causes of issues.

Vendor Support and Tools

Cisco integrates Remote Monitoring (RMON) capabilities directly into its software for switches and routers, enabling network administrators to configure and manage RMON groups such as alarms and events through (CLI) commands like rmon alarm. This embedded support allows for proactive monitoring of segments without requiring additional hardware agents. Huawei implements RMON1 and RMON2 in its enterprise switches and routers, providing packet statistics collection, history tracking, alarms, and events for Ethernet interfaces to facilitate remote via SNMP. Similarly, H3C supports RMON configuration in its networking equipment, allowing proactive monitoring and management of devices through SNMP-based protocols. Networking OS extends RMON functionality with 64-bit counters (e.g., via the rmon hc-alarm command) to handle high-speed networks, supporting both 32-bit and 64-bit statistics for long-term performance monitoring. Open-source tools like and enable integration with RMON data by polling SNMP MIBs from network devices, allowing users to collect and visualize RMON statistics such as traffic counters and alarms in dashboards. supports the dissection of SNMP traffic, which includes interactions with RMON agents, facilitating analysis of captured RMON-related packets for troubleshooting.

References

  1. [1]
    Introduction to the Remote Monitoring (RMON) Family of MIB Modules
    RFC 3577 Introduction to RMON August 2003 Aggregation Layers Data Link Network ... Remote Network Monitoring MIB", RFC 1513, September 1993. [RFC2021] ...
  2. [2]
  3. [3]
  4. [4]
    RFC 2819 - Remote Network Monitoring Management Information ...
    Remote Network Monitoring Management Information Base (RFC 2819, )
  5. [5]
    RFC 3577 - Introduction to the Remote Monitoring (RMON) Family of ...
    Remote network monitoring devices, often called monitors or probes, are instruments that exist for the purpose of managing and/or monitoring a network.<|control11|><|separator|>
  6. [6]
  7. [7]
  8. [8]
    RFC 1757 - Remote Network Monitoring Management Information ...
    This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.Missing: inefficiencies origins
  9. [9]
    RFC 1271 - Remote Network Monitoring Management Information ...
    This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.
  10. [10]
    RFC 2613 - Remote Network Monitoring MIB Extensions for ...
    RMON also defines a simple thresholding monitoring mechanism, event- logging and event-notification for any MIB instance; SMON utilizes the alarms and events ...
  11. [11]
    RFC 4502 - Remote Network Monitoring Management Information ...
    This document defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.
  12. [12]
  13. [13]
  14. [14]
  15. [15]
  16. [16]
  17. [17]
  18. [18]
  19. [19]
    RFC 1757: Remote Network Monitoring Management Information ...
    RFC 1757 defines a MIB portion for network management protocols, specifically for managing remote network monitoring devices, as part of the Management ...
  20. [20]
  21. [21]
  22. [22]
  23. [23]
  24. [24]
  25. [25]
  26. [26]
  27. [27]
  28. [28]
  29. [29]
  30. [30]
  31. [31]
    RFC 2021: Remote Network Monitoring Management Information ...
    This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.
  32. [32]
    RFC 1271: Remote Network Monitoring Management Information ...
    This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets.
  33. [33]
  34. [34]
    Configuring RMON Support - Cisco
    Jun 22, 2011 · The RMON feature identifies activity on individual nodes and allows you to monitor all nodes and their interaction on a LAN segment. Used in ...Missing: benefits | Show results with:benefits
  35. [35]
    Configuring RMON Alarm and Event Settings from the Command ...
    Oct 26, 2005 · This document describes how to set up Remote Monitoring (RMON) Alarms and Events on a router from the command line interface (CLI).
  36. [36]
    Overview of RMON and RMON2 - Huawei Technical Support
    Oct 31, 2025 · It provides packet statistics and alarm functions for Ethernet interfaces. The management devices use RMON to remotely manage network elements.Missing: H3C | Show results with:H3C
  37. [37]
    Support - 06-RMON configuration - H3C
    Remote Network Monitoring (RMON) is an SNMP-based network management protocol. It enables proactive remote monitoring and management of network devices.Missing: Huawei enterprise
  38. [38]
    Remote Monitoring (RMON) - Dell
    Dell EMC Networking OS RMON is based on IEEE standards, providing both 32-bit and 64-bit monitoring and long-term statistics collection.Missing: extensions | Show results with:extensions
  39. [39]
    SNMP monitoring and integration with Zabbix
    SNMP Simple Network Management Protocol is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks.
  40. [40]
    SNMP Monitoring | Nagios Enterprises
    Apr 2, 2025 · Nagios utilizes SNMP to deliver a powerful, agentless monitoring solution, enabling organizations to track network health and resolve issues proactively.
  41. [41]
    Chapter 6. Working With Captured Packets - Wireshark
    Once you have captured some packets or you have opened a previously saved capture file, you can view the packets that are displayed in the packet list pane ...