570
C
HAPTER
28: SNMP C
ONFIGURATION
Displaying and
Debugging SNMP
After the above configuration, execute the
display
command in all views to display
the running of the SNMP configuration, and to verify the effect of the configuration.
Execute the
debugging
command in User View to debug SNMP configuration.
Table 631
Display and Debug SNMP
SNMP Configuration
Example
Networking Requirements
Network Management Station and the Switch are connected using the Ethernet. The
IP address of Network Management Station is 129.102.149.23 and that of the VLAN
interface on the Switch is 129.102.0.1.
Perform the following configurations on the
Switch: set the community name and access authority, administrator ID, contact and
Switch location, and enable the Switch to send trap packet.
Networking Diagram
Figure 166
SNMP Configuration Example
Operation
Command
Display the modules with trap enabled
and the module with trap not enabled
display snmp-agent trap-list
Display the statistics information about
SNMP packets
display snmp-agent statistics
Display the engine ID of the active device
display snmp-agent { local-engineid |
remote-engineid }
Display the group name, the security
mode, the states for all types of views,
and the storage mode of each group of
the Switch.
display snmp-agent group [
group-name
]
Display the names of all users in the group
user table
display snmp-agent usm-user [ engineid
engineid
] [ group
groupname
] [
username
username
]
Display the current community name
display snmp-agent community [ read |
write ]
Display the current MIB view
display snmp-agent mib-view [ exclude
| include | viewname
mib-view
]
Display the contact character string of the
system
display snmp-agent sys-info contact
Display the location character string of the
system
display snmp-agent sys-info location
Display the version character string of the
system
display snmp-agent sys-info version
Ethernet
NMS
129.102.0.1
129.102.149.23
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...