SNMP is a networking protocol that can be used to monitor network-attached Mercury hardware. SNMP allows for the retrieval of management data in the form of variables on the managed systems. These variables can be queried with GET commands (and sometimes set) by command line applications such as SNMP “walkers” as well as networking software such as GetIF that comes with a graphical user interface.
Mercury hardware does not currently support SET or TRAP functions but has variables that can be retrieved and displayed to the administrator. GetIF also displays the device’s up-time; the time since last reset.
SNMP support was re-enabled starting in 1.17.0 EP firmware. Mercury Security's Private Enterprise Number (PEN) is 40334 (http://www.iana.org/assignments/enterprise-numbers).
SNMP Version and Implementation
SNMP can be disabled on the Mercury controllers if needed for security reasons. The web configuration Users page has a checkbox labeled "Disable SNMP" that can be used to turn off SNMP. By default SNMP is enabled.
Here is an example of GetIF returning the system variable information for an EP1502 Mercury controller on the network. To select which host to retrieve the variables off of, specify the IP address in the host name dialog box outlined in red below. The IP address of this particular EP1502 is 192.168.1.199. Each variable is automatically filled into a text box that has the corresponding label next to it. Along with a description of the device, the SysDescr (system description) variable also returns the firmware build
number that is running on the device. The OEM code in SysContact will change based on the partner’s ID. SysUpTime shows the amount of time since the board’s last reboot. The SysObjectID shows that Mercury Security has OIDs registered under the enterprise number 40334.
GetIF also supports a Management Information Base (MIB) browser that can get even more system variables from the device. These other variables include things such as the MAC address (.iso.126.96.36.199.188.8.131.52.184.108.40.206), subnet mask (.iso.220.127.116.11.18.104.22.168.22.214.171.124.168.1.199), etc.