zPerform the following configuration on Switch A: setting the community name and access permission, administrator ID, contact and location of Switch A, and enabling the device to sent trap messages.

Thus, the NMS is able to access Switch A and receive the trap messages sent by Switch A.

Figure 1-2Network diagram for SNMP configuration

10.10.10.110 .10 .10 .2

NMS

Ethernet

Switch A

Network procedure

# Enable SNMP agent, and set the SNMPv1 and SNMPv2c community names.

<device> system-view

[device] snmp-agent

[device] snmp-agent sys-info version all

[device] snmp-agent community read public

[device] snmp-agent community write private

# Set the access right of the NMS to the MIB of the SNMP agent.

[device] snmp-agent mib-view include internet 1.3.6.1

# For SNMPv3, set:

z

z

z

z

z

z

SNMPv3 group and user

security to the level of needing authentication and encryption authentication protocol to HMAC-MD5

authentication password to passmd5 encryption protocol to AES encryption password to cfb128cfb128

[device] snmp-agent group v3 managev3group privacy write-view internet

[device] snmp-agent usm-user v3 managev3user managev3group authentication-mode md5 passmd5 privacy-mode aes128 cfb128cfb128

#Set the VLAN-interface 2 as the interface used by NMS. Add port GigabitEthernet 1/0/2, which is to be used for network management, to VLAN 2. Set the IP address of VLAN-interface 2 as 10.10.10.2.

[device] vlan 2

[device-vlan2] port Ethernet 1/0/2

[device-vlan2] quit

[device] interface Vlan-interface 2 [device-Vlan-interface2] ip address 10.10.10.2 255.255.255.0

[device-Vlan-interface2] quit

#Enable the SNMP agent to send Trap messages to the NMS whose IP address is 10.10.10.1. The SNMP community name to be used is “public”.

[device] snmp-agent trap enable standard authentication

[device] snmp-agent trap enable standard coldstart

[device] snmp-agent trap enable standard linkup

1-8

Page 433
Image 433
3Com WX3000 operation manual Network procedure, 2Network diagram for Snmp configuration