Cisco Systems WSC2960X48TSL, WSC2960X24TDL Command or Action, Range is 1 to 1000 the default is

Page 71

Configuring Simple Network Management Protocol

Configuring SNMP Notifications

Command or Action

Step 5 snmp-server host host-addr[informs traps] [version {1 2c 3 {auth noauth priv}}]

community-string [notification-type]

Example:

Switch(config)# snmp-server host 203.0.113.1 comaccess snmp

Step 6 snmp-server enable traps notification-types

Example:

Switch(config)# snmp-server enable traps snmp

Step 7 snmp-server trap-source interface-id

Example:

Switch(config)# snmp-server trap-source

GigabitEthernet1/0/1

Purpose

Specifies the recipient of an SNMP trap operation.

For host-addr, specify the name or Internet address of the host (the targeted recipient).

(Optional) Specify traps (the default) to send SNMP traps to the host. Specify informs to send SNMP informs to the host.

(Optional) Specify the SNMP version (1, 2c, or 3). SNMPv1 does not support informs.

(Optional) For Version 3, select authentication level auth, noauth, or priv.

For community-string, when version 1 or version 2c is specified, enter the password-like community string sent with the notification operation. When version 3 is specified, enter the SNMPv3 username.

The @ symbol is used for delimiting the context information. Avoid using the @ symbol as part of the SNMP community string when configuring this command.

(Optional) For notification-type, use the keywords listed in the table above. If no type is specified, all notifications are sent.

Enable the switch to send traps or informs and specify the type of notifications to be sent. For a list of notification types, see the table above, or enter snmp-server enable traps ?

To enable multiple types of traps, you must enter a separate snmp-server enable traps command for each trap type.

Note When you configure a trap by using the notification type port-security, configure the port security trap first, and then configure the port security trap rate:

1 snmp-server enable traps port-security

2 snmp-server enable traps port-security trap-rate rate

(Optional) Specify the source interface, which provides the IP address for the trap message. This command also sets the source IP address for informs.

Step 8

snmp-server queue-length length

(Optional) Establish the message queue length for each trap host. The

 

 

range is 1 to 1000; the default is 10.

Example:

Switch(config)# snmp-serverqueue-length 20

Catalyst 2960-X Switch Network Management Configuration Guide, Cisco IOS Release 15.0(2)EX

OL-29044-01

59

Image 71
Contents First Published July 10 Americas HeadquartersPage N T E N T S Configuring the Cisco Discovery Protocol Configuring Simple Network Management Protocol Rspan Vlan Vii Viii Bold font Document ConventionsConvention Description Reader Alert Conventions Related Documentation Obtaining Documentation and Submitting a Service RequestXii Command Modes Information About Using the Command-Line InterfaceCtrl-Z Mode Access Method Prompt Exit Method About This ModeConfigure QuitHelp Using the Help SystemCommand or Action Purpose Step ModeCLI Error Messages Understanding Abbreviated CommandsNo and default Forms of Commands Error Message Meaning How to Use the CLI to Configure FeaturesConfiguration Logging Configuring the Command HistoryCommand or Action Changing the Command History Buffer SizeRecalling Commands Terminal no history Enabling and Disabling Editing FeaturesDisabling the Command History Feature Privileged Exec modeEditing Commands through Keystrokes Editing Command Lines That Wrap Show more command begin include exclude Searching and Filtering Output of show and more CommandsAccess-list Show more command begin include exclude regular-expressionCommand or Action Example OL-29044-01 Prerequisites for Configuring the Configuration Engine Finding Feature InformationRelated Topics Restrictions for Configuring the Configuration EngineInformation About Configuring the Configuration Engine Cisco Configuration Engine SoftwareCisco Configuration Engine Architectural Overview Configuration ServiceNameSpace Mapper Event ServiceCisco Networking Services IDs and Device Hostnames ConfigIDHostname and DeviceID Hostname, DeviceID, and ConfigIDDeviceID Cisco IOS CNS Agents Initial ConfigurationDevice Required Configuration Automated CNS ConfigurationIncremental Partial Configuration Synchronized ConfigurationEnd How to Configure the Configuration EngineConfigure terminal Enabling the CNS Event AgentReconnect-time time backup Configure terminal Enters the global configuration modeEnabling the Cisco IOS CNS Agent Cns config initial hostname ip-addressCns config partial hostname ip-address End Returns to privileged Exec mode Enabling an Initial Configuration for Cisco IOS CNS AgentCommand or Action Purpose On the switchExit Hostname name Configure terminal Cns template connect nameDiscover controller controller-typedlci Exit Returns to global configuration modeExit Hostname string string udi event image commandSource ip-address syntax-check Port-number event no-persistShow cns event connections Show cns config connectionsRefreshing DeviceIDs No cns event ip-address port-number Cns config partial ip-addresshostname Enabling a Partial Configuration for Cisco IOS CNS AgentCommand Purpose Monitoring CNS ConfigurationsCisco IOS 15.02EX Additional ReferencesTechnical Assistance Description Link Release ModificationCDP Overview Information About CDPFeature How to Configure CDPDefault CDP Configuration Configuring CDP CharacteristicsOptional Configures CDP to send Version-2 advertisements Disabling CDP Configure terminal No cdp run EndNo cdp run Disables CDP Enabling CDP Configure terminal Cdp run EndCdp run Enables CDP if it has been disabled Specifies the interface on which you are disabling CDP No cdp enable EndEnters interface configuration mode Disabling CDP on an InterfaceEnabling CDP on an Interface Cdp enable EndSpecifies the interface on which you are enabling CDP Cdp enable Enables CDP on a disabled interfaceCommand Description Monitoring and Maintaining CDPRelated Documents Related Topic Document Title CommandShow cdp neighbors interface-id Show cdp trafficFeature History and Information for Cisco Discovery Protocol Supported Snmp Versions Prerequisites for SnmpModel Level Authentication Encryption Result SHA Snmp Manager Functions Restrictions for SnmpInformation About Snmp Snmp OverviewSnmp Community Strings Snmp MIB Variables AccessSnmp Agent Functions Snmp ifIndex MIB Object Values Snmp NotificationsInterface Type Default Snmp ConfigurationSnmp Configuration Guidelines Feature Default SettingDisabling the Snmp Agent How to Configure SnmpConfigure terminal No snmp-server End No snmp-server Disables the Snmp agent operation Configuring Community StringsSwitchconfig# access-list 4 deny any Snmp-server engineID local Configuring Snmp Groups and UsersSnmp-server user username V1 is the least secure of the possible security modelsIntegers twice the normal width End Example Configuring Snmp NotificationsNotification Type Keyword Description Rtr Snmp-server enable traps port-securitySnmp-server enable traps port-security trap-rate rate Port-securitySnmp-server user username group-nameremote V2c access access-list v3 encrypted accessRange is 1 to 1000 the default is Setting the Agent Contact and Location Information Snmp-server location text Sets the system location string Limiting Tftp Servers Used Through SnmpSnmp-server contact text Sets the system contact string Snmp-server tftp-server-list Monitoring Snmp StatusSnmp Examples Switchconfig# snmp-server enable traps entity Prerequisites for Span and Rspan Configuring Span and RspanRspan Restrictions for Span and RspanFlow-Based Span Fspan and Flow-Based Rspan Frspan Local Span Information About Span and RspanSpan and Rspan Remote Span Example of Local Span Configuration on a Single DeviceSpan and Rspan Concepts and Terminology Example of Rspan ConfigurationSpan Sessions Source Ports Source VLANs Rspan Vlan Span and Rspan Interaction with Other Features Span and Rspan and Device Stacks Flow-Based SpanSpan Configuration Guidelines Default Span and Rspan ConfigurationConfiguration Guidelines Creating a Local Span Session How to Configure Span and RspanRspan Configuration Guidelines Fspan and Frspan Configuration GuidelinesBoth rx tx Monitor session sessionnumber sourceEnd Local remote No monitor session sessionnumber allSpecifying VLANs to Filter Command or Action PurposeMonitor session sessionnumber filter vlan Configuring a Vlan as an Rspan VlanRemote-span Remote-span EndCreating an Rspan Source Session Destination remote vlan vlan-id Monitor session sessionnumberSwitchconfig# no monitor session Creating an Rspan Destination Session Remote vlan vlan-id Switchconfig# monitor session 2 source remote vlan Configure terminal Enters global configuration mode Configuring an Fspan SessionMonitor session sessionnumber source Configuring an Frspan Session Detailed Steps Show monitor Or Frspan configurationMonitoring Span and Rspan Operations Example Configuring Local Span Span and Rspan Configuration ExamplesExamples Creating an Rspan Vlan Feature History and Information for Span and RspanLimit IPv4, IPv6 or IPv4 + IPv6, or D E Span sessions
Related manuals
Manual 18 pages 20.28 Kb

WSC2960X24TSL, C2960XSTACK, WSC2960X24PDL, WSC2960X24TSLL, WSC2960X24PSL specifications

Cisco Systems has long been a leader in networking technology, and its range of switching products exemplifies its commitment to high performance and reliability. Among its popular offerings are the Catalyst 2960-X and 2960-XR series switches, including models like WSC2960X48TSL, WSC2960XR48FPDI, WSC2960XR24TDI, and WSC2960XR48LPDI. These switches are designed to deliver efficient Layer 2 and Layer 3 capabilities, making them ideal for enterprise and small to medium-sized business networks.

The WSC2960X48TSL model boasts 48 Ethernet ports, providing ample connectivity for various devices. It supports Power over Ethernet (PoE), making it suitable for powering IP cameras, wireless access points, and VoIP phones. The switch also features Cisco’s Smart Operations technology, which simplifies network management and enhances user experience through automated features such as Cisco Auto Smartports and Auto QoS.

Turning to the WSC2960XR48FPDI, this version also features 48 ports but with enhanced redundancy and power capabilities, making it suitable for critical applications where uptime is paramount. This switch offers dual power supply options, ensuring that even in the event of a power failure, network operations continue seamlessly. Its Flexible NetFlow feature enables enhanced visibility and monitoring of traffic, allowing businesses to optimize their bandwidth usage and troubleshoot issues more efficiently.

The WSC2960XR24TDI model, with its 24 ports, is perfectly designed for networks with fewer devices yet still demands robust performance. It also includes advanced security features, such as IEEE 802.1X port-based authentication, enhancing the protection of sensitive data and communications within the network.

Lastly, the WSC2960XR48LPDI model is tailored for environments that require high availability and robust performance, featuring 48 ports along with Layer 3 static routing capabilities. With its support for IPv6 and advanced QoS features, this switch is prepared for the future of networking, accommodating the increasing demand for bandwidth and reliable connectivity.

All these switches utilize Cisco IOS software, providing a familiar interface for network administrators. They also incorporate advanced troubleshooting tools, like Cisco Prime, which facilitate effective network management. Collectively, the WSC2960 series switches represent a comprehensive solution for businesses seeking dependable, scalable, and manageable networking options. With their combination of performance, features, and reliability, these Cisco switches are essential for meeting the demands of modern networking.