snmp cisco C9500-16X

zero

Случайный прохожий
Как настроить snmp в C9500-16X для просмотра состояния портов в nagios ?
Когда хочу посмотреть snmp community то получается:
CORE_10G#sh snmp community
%SNMP agent not enabled
 
Procedure
Command or Action​
Purpose​
Step 1
enable
Example:
Device> enable​
Enables privileged EXEC mode.
  • Enter your password if prompted.
Step 2
configure terminal
Example:

Device# configure terminal

Enters global configuration mode.​
Step 3
snmp-server engineID { local engineid-string | remote ip-address [ udp-port port-number] engineid-string}
Example:

Device(config)# snmp-server engineID local 1234
Configures a name for either the local or remote copy of SNMP.
  • The engineid-string is a 24-character ID string with the name of the copy of SNMP. You need not specify the entire 24-character engine ID if it has trailing zeros. Specify only the portion of the engine ID up to the point where only zeros remain in the value. The Step Example configures an engine ID of 123400000000000000000000.
  • If you select remote , specify the ip-address of the device that contains the remote copy of SNMP and the optional User Datagram Protocol (UDP) port on the remote device. The default is 162.
Step 4
snmp-server group group-name { v1 | v2c | v3 { auth | noauth | priv} } [ read readview] [ write writeview] [ notify notifyview] [ access access-list]
Example:

Device(config)# snmp-server group public v2c access lmnop
Configures a new SNMP group on the remote device.
For group-name , specify the name of the group.
Specify one of the following security models:
  • v1 is the least secure of the possible security models.
  • v2c is the second least secure model. It allows transmission of informs and integers twice the normal width.
  • v3 , the most secure, requires you to select one of the following authentication levels:
    auth —Enables the Message Digest 5 (MD5) and the Secure Hash Algorithm (SHA) packet authentication.
    noauth —Enables the noAuthNoPriv security level. This is the default if no keyword is specified.
    priv —Enables Data Encryption Standard (DES) packet encryption (also called privacy).
(Optional) Enter read readview with a string (not to exceed 64 characters) that is the name of the view in which you can only view the contents of the agent.
(Optional) Enter write writeview with a string (not to exceed 64 characters) that is the name of the view in which you enter data and configure the contents of the agent.
(Optional) Enter notify notifyview with a string (not to exceed 64 characters) that is the name of the view in which you specify a notify, inform, or trap.
(Optional) Enter access access-list with a string (not to exceed 64 characters) that is the name of the access list.​
Step 5
snmp-server user username group-name { remote host [ udp-port port] } { v1 [ access access-list] | v2c [ access access-list] | v3 [ encrypted] [ access access-list] [ auth { md5 | sha} auth-password] } [ priv { des | 3des | aes { 128 | 192 | 256} } priv-password]
Example:

Device(config)# snmp-server user Pat public v2c
Adds a new user for an SNMP group.
The username is the name of the user on the host that connects to the agent.
The group-name is the name of the group to which the user is associated.
Enter remote to specify a remote SNMP entity to which the user belongs and the hostname or IP address of that entity with the optional UDP port number. The default is 162.
Enter the SNMP version number (v1 , v2c , or v3 ). If you enter v3 , you have these additional options:
  • encrypted specifies that the password appears in encrypted format. This keyword is available only when the v3 keyword is specified.
  • auth is an authentication level setting session that can be either the HMAC-MD5-96 (md5 ) or the HMAC-SHA-96 (sha ) authentication level and requires a password string auth-password (not to exceed 64 characters).
If you enter v3 you can also configure a private (priv ) encryption algorithm and password string priv-password using the following keywords (not to exceed 64 characters):
  • priv specifies the User-based Security Model (USM).
  • des specifies the use of the 56-bit DES algorithm.
  • 3des specifies the use of the 168-bit DES algorithm.
  • aes specifies the use of the DES algorithm. You must select either 128-bit, 192-bit, or 256-bit encryption.
(Optional) Enter access access-list with a string (not to exceed 64 characters) that is the name of the access list.​
Step 6
end
Example:

Device(config)# end

Returns to privileged EXEC mode.​
Step 7
show running-config
Example:

Device# show running-config

Verifies your entries.​
Step 8
copy running-config startup-config
Example:

Device# copy running-config startup-config

(Optional) Saves your entries in the configuration file.​
 
я кажется понял, спасибо. Нужно указать ip куда отвечать на snmp запросы и настроить community
 
Назад
Верх Низ