68
SNMP C
ONFIGURATION
SNMP Overview
By far, the simple network management protocol (SNMP) has gained the most
extensive application in the computer networks. SNMP has been put into use and
widely accepted as an industry standard in practice. It is used for ensuring the
transmission of the management information between any two nodes. In this way,
network administrators can easily search and modify the information on any node
on the network. In the meantime, they can locate faults promptly and implement
the fault diagnosis, capacity planning and report generating.
SNMP adopts the polling mechanism and provides the most basic function set. It is
most applicable to the small-sized, fast-speed and low-cost environment. It only
requires the connectionless transport layer protocol UDP; and is thus widely
supported by many products.
SNMP Operation
Mechanism
SNMP can be divided into two parts, namely, Network Management Station and
Agent:
Network management station (NMS) is the workstation for running the client
program. At present, the commonly used NM platforms include 3Com’s Network
Management Products, Sun NetManager and IBM NetView.
Agent is the server software operated on network devices.
The NMS can send GetRequest, GetNextRequest and SetRequest messages to the
Agent. Upon receiving the requests from the NMS, Agent will perform Read or
Write operation according to the message types, generate and return the
Response message to the NMS.
Agent will send Trap message on its own initiative to the NMS to report the events
whenever the device status changes or the device encounters any abnormalities
such as restarting the device.
SNMP Versions
Currently SNMP Agent of the device supports SNMP V3, and is compatible with
SNMP V1 and SNMP V2C.
SNMP V3 adopts user name and password authentication.
SNMP V1 and SNMP V2C adopt community name authentication. The SNMP
packets failing to pass community name authentication are discarded. The
community name is used to define the relation between SNMP NMS and SNMP
Agent. The community name can limit access to SNMP Agent from SNMP NMS,
functioning as a password. You can define the following features related to the
community name.
Summary of Contents for Switch 7757
Page 32: ...32 CHAPTER 1 CLI OVERVIEW...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION...
Page 126: ...126 CHAPTER 14 SUPER VLAN...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION...
Page 718: ...718 CHAPTER 63 CLUSTER...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING...