1-8
z Perform the following configuration on Switch A: setting the community name and access
permission, administrator ID, contact and location of Switch A, and enabling the device to sent trap
messages.
Thus, the NMS is able to access Switch A and receive the trap messages sent by Switch A.
Figure 1-2 Network diagram for SNMP configuration
Ethernet
10.10.10.1
NMS
10.10 .10 .2
Switch A
Network procedure
# Enable SNMP agent, and set the SNMPv1 and SNMPv2c community names.
<device> system-view
[device] snmp-agent
[device] snmp-agent sys-info version all
[device] snmp-agent community read public
[device] snmp-agent community write private
# Set the access right of the NMS to the MIB of the SNMP agent.
[device] snmp-agent mib-view include internet 1.3.6.1
# For SNMPv3, set:
z SNMPv3 group and user
z security to the level of needing authentication and encryption
z authentication protocol to HMAC-MD5
z authentication password to passmd5
z encryption protocol to AES
z encryption password to cfb128cfb128
[device] snmp-agent group v3 managev3group privacy write-view internet
[device] snmp-agent usm-user v3 managev3user managev3group authentication-mode md5 passmd5
privacy-mode aes128 cfb128cfb128
# Set the VLAN-interface 2 as the interface used by NMS. Add port GigabitEthernet 1/0/2, which is to be
used for network management, to VLAN 2. Set the IP address of VLAN-interface 2 as 10.10.10.2.
[device] vlan 2
[device-vlan2] port Ethernet 1/0/2
[device-vlan2] quit
[device] interface Vlan-interface 2
[device-Vlan-interface2] ip address 10.10.10.2 255.255.255.0
[device-Vlan-interface2] quit
# Enable the SNMP agent to send Trap messages to the NMS whose IP address is 10.10.10.1. The
SNMP community name to be used is “public”.
[device] snmp-agent trap enable standard authentication
[device] snmp-agent trap enable standard coldstart
[device] snmp-agent trap enable standard linkup