当前位置:文档之家› snmp配置大全

snmp配置大全

Cisco snmp配置:思科一:设置IOS设备在IOS的Enable状态下,敲入config terminal 进入全局配置状态Cdp run 启用CDPsnmp-server community gsunion ro 配置本路由器的只读字串为gsunion snmp-server community gsunion rw 配置本路由器的读写字串为gsunions nmp-server enable traps 允许路由器将所有类型SNMP Trap发送出去snmp-server host IP-address-server traps trapcomm 指定路由器SNMP Trap 的接收者为10.238.18.17,发送Trap时采用trapcomm作为字串snmp-server trap-source loopback0 将loopback接口的IP地址作为SNMP Trap 的发送源地址logging on 起动log机制logging IP-address-server 将log记录发送到10.238.18.17 (CW2K安装机器的IP地址)上的syslog serverlogging facility local7 将记录事件类型定义为local7logging trap warning 将记录事件严重级别定义为从warningl开始,一直到最紧急级别的事件全部记录到前边指定的syslog server.logging source-interface loopback0 指定记录事件的发送源地址为loopback0的IP地址service timestamps log datetime 发送记录事件的时候包含时间标记enable password ******line tty 0 4password ******login local 设置Enable口令和Telnet口令show runningcopy running start或write terminal 显示并检查配置保存配置配置Cisco设备的SNMP代理配置Cisco设备上的SNMP代理的步骤如下:启用SNMP:configure terminalsnmp-server community rw/ro (example: snmp-server community public ro)endcopy running-configstartup-config启用陷阱:configure terminalsnmp-server enable traps snmp authenticationendcopy running-configstartup-config配置snmp#conf t#snmp-server community cisco ro(只读);配置只读通信字符串#snmp-server community secret rw(读写);配置读写通信字符串#snmp-server enable traps ;配置网关SNMP TRAP#snmp-server host 10.254.190.1 rw ;配置网关工作站地址设置CatOS设备在CatOS的Enable状态下,敲入set interface sc0 VLAN ID IP address 配置交换机本地管理接口所在VLAN ID,IP地址,子网掩码Set cdp enable all 启用CDPset snmp community read-only gsunion 配置本交换机的只读字串为public set snmp community read-write-all gsunion 配置本交换机的读写字串为privateset snmp trap server-ip gsunion指定交换机SNMP Trap的接收者为网管服务器,发送Trap时采用gsunion作为字串set snmp trap enable all 将全部类型的SNMP Trap发送出去set snmp rmon enable 激活交换机的SNMP RMON功能set logging server IP-address-server 将log记录发送到网管服务器的IP (CW2K安装机器的IP地址)上的syslog serverset logging level 6 将记录事件严重级别定义为从informational开始,一直到最紧急级别的事件全部记录到前边指定的syslog serverset logging server facility local7 将记录事件类型定义为local7set logging timestamp 发送记录事件的时候包含时间标记set logging enable 起动log机制set password ******set enablepass ******设置Enable口令和Telnet口令show runningwrite terminal 显示并检查配置保存配置配置PIX设备Logging on 在PIX上面启用日志记录Snmp-server community gsunion 为PIX设备配置共同体串gsunionSnmp-server enable traps 配置PIX设备将SNMP消息发送到网管服务器Snmp-server host server-ip 在PIX设备上面配置SNMP网管服务器Logging history warning为PIX设备SNMP系统日志消息设置warning级别。

华为:1. V1sys进入系统视图, 键入Ctrl+Z退回到用户视图.[Quidway]interface vlan 1[Quidway-Vlan-interface1]ip address 192.168.1.2 24[Quidway-Vlan-interface1]%2000/4/1 23:58:06:914 Quidway IFNET/5/UPDOWN:- 1 -链路协议在接口Vla n-interface1上状态变为UP[Quidway-Vlan-interface1]quit[Quidway]snmp-agent sys-info version v1[Quidway]snmp-agent community ?read 该团体名在指定视图内有只读权限write 该团体名在指定视图内有读写权限[Quidway]snmp-agent community read public[Quidway]snmp-agent community write private[Quidway]snmp-agent trap enable[Quidway]snmp-agent target-host trap address udp-domain 192.168.1.1 u dp-port 5000 params securityname public[Quidway]dis cur2. V2C[Quidway]snmp-agent sys-info version v2c[Quidway]snmp-agent community ?read 该团体名在指定视图内有只读权限write 该团体名在指定视图内有读写权限[Quidway]snmp-agent community read public[Quidway]snmp-agent community write private[Quidway]snmp-agent trap enable[Quidway]snmp-agent target-host trap address udp-domain 192.168.1.1 u dp-port 5000 params securityname public[Quidway]dis cur3. V3 SHA认证dis hissysint vlan 1ip address 192.168.1.2 24quitsnmp-agent sys-info version v3snmp-agent mib-view included pingyangview internetsnmp-agent group v3 pingyanggroup privacy read-view pingyangview wr ite-view pingyangview notify-view pingyangviewsnmp-agent usm-user v3 pingyang pingyanggroup authentication-mode s ha 12345 privacy-mode des56 12345snmp-agent trap enablesnmp-agent target-host trap address udp-domain 192.168.1.1 udp-port 5000 params securityname pingyang v2c[Quidway]dis cur4.V3 MD5认证[Quidway] dis hissysint vlan 1ip address 192.168.1.2 24quitsnmp-agent sys-info version v3snmp-agent mib-view included pingyangview internetsnmp-agent group v3 pingyanggroup privacy read-view pingyangview wr ite-view pingyangview notify-view pingyangviewsnmp-agent usm-user v3 pingyang pingyanggroup authentication-mode m d5 12345 privacy-mode des56 12345snmp-agent trap enablesnmp-agent target-host trap address udp-domain 192.168.1.2 udp-por t 5000 params securityname pingyang v2c[Quidway]dis curH3C一、交换机简单管理协议增加指令----以便接入H3C的管理软件中snmp-agentsnmp-agent community read publicsnmp-agent community write privatesnmp-agent sys-info version v1 v3snmp-agent trap enable神码神码dcr-5526配置如下:!hostname Digitalchina DCRS-5526snmp-server location Chinasnmp-server contact Digitalchina Networks Limited!snmp-server community private rwsnmp-server community public ro!username admin access-level 15username admin password 7 7d7b16c803fd10461c44f8b7db3826fd username guest access-level 0username guest password 7 084e0343a0486ff05530df6c705c8bb4 enable password level 15 7 1b3231655cebb7a1f783eddf27d254ca !。

相关主题