24-13
Catalyst 2950 Desktop Switch Software Configuration Guide
78-14982-01
Chapter 24 Configuring SNMP Configuring SNMP

Setting the Agent Contact and Location Information

Beginning in privileged EXEC mode, follow these steps to set the system contact and location of the
SNMP agen t so that these de scripti ons can be accesse d through the configuration file:

Limiting TFTP Servers Used Through SNMP

Beginning i n privileged EX EC mode , foll ow these s te ps t o li mit t he T FTP ser vers us ed for saving a nd
loading co nfiguration files through SNMP to the ser vers specified in an access list:
Command Purpose
Step 1 configure terminal Enter glob al con figuration mo de.
Step 2 snm p-server co ntact text Set the sys tem contac t str ing.
Fo r example:
snmp-server contact Dial System Operator at beeper 21555.
Step 3 snm p-server l ocation text Set the system location string.
Fo r example:
snmp-server location Building 3/Room 222
Step 4 end Return to privileged EXEC mode.
Step 5 show running-config Verify your e ntri es.
Step 6 copy running-config startup-config (Optiona l) Save your entries in the co nfigurati on file.
Command Purpose
Step 1 configure terminal Enter gl obal configurat ion mode.
Step 2 snmp-se rver tftp-s erver-list
access-list-number Limit TFTP servers used f or configura tion file co pies thr oug h
SNMP to the servers in th e access list.
For access-list-number, enter an IP standard access list nu mbered
from 1 to 99 a nd 130 0 to 19 99.
Step 3 access-list access-list-number {deny |
permit} source [source-wildcard]Create a s tandard acc ess list, repeat ing the co mmand as man y times
as necessary.
For access-list-number, enter the access list number specified
in Step 2.
The deny ke yword denies access if the conditions are matched.
The permit keyword permits access if the conditions are
matched.
For source, enter th e IP ad dress of the T FTP ser vers th at can
access the switch.
(Optio na l) For source-wildcard, enter th e wildcard bits, in
dotted deci mal notatio n, to be applied to the sourc e. Place one s
in the bit positions that yo u want to ign ore.
Recall that the access list is always term inated by an implicit deny
stat em en t fo r everything.