57
3-7. SNMP Configuration
Any Network Management System (NMS) running the Simple Network
Management Protocol (SNMP) can manage the Managed devices equipped with
SNMP agent, provided that the Management Information Base (MIB) is installed
correctly on the managed devices. The SNMP is a protocol that is used to govern
the transfer of information between SNMP manager and agent and traverses the
Object Identity (OID) of the management Information Base (MIB), described in the
form of SMI syntax. SNMP agent is running on the switch to response the request
issued by SNMP manager.
Basically, it is passive except issuing the trap information. The switch
supports a switch to turn on or off the SNMP agent. If you set the field SNMP
“Enable”, SNMP agent will be started up. All supported MIB OIDs, including RMON
MIB, can be accessed via SNMP manager. If the field SNMP is set “Disable”, SNMP
agent will be de-activated, the related Community Name, Trap Host IP Address,
Trap and all MIB counters will be ignored.
Function name:
SNMP Configuration
Function description:
This function is used to configure SNMP settings, community name, trap host
and public traps as well as the throttle of SNMP. A SNMP manager must pass the
authentication by identifying both community names, then it can access the MIB
information of the target device. So, both parties must have the same community
name. Once completing the setting, click
<Apply>
button, the setting takes effect.
Parameters description:
SNMP:
The term SNMP here is used for the activation or de-activation of SNMP.
Default is Enable.
Get/Set/Trap Community:
Community name is used as password for authenticating if the
requesting network management unit belongs to the same community
group. If they both don’t have the same community name, they don’t
belong to the same group. Hence, the requesting network management
unit can not access the device with different community name via SNMP
protocol; If they both have the same community name, they can talk each
other.
Community name is user-definable with
a maximum length of 15
characters and is case sensitive. There is not allowed to put any blank in
the community name string. Any printable character is allowable.
The community name for each function works independently. Each
function has its own community name. Say, the community name for
GET only works for GET function and can’t be applied to other function
such as SET and Trap.
Summary of Contents for L2 Plus
Page 1: ......
Page 2: ......
Page 3: ...16 Port SFP 8 Port Combo GbE L2 Plus Managed Switch...
Page 4: ...2...
Page 36: ...34 Fig 2 15 Office Network Connection Fig 2 14 Peer to peer Network Connection...
Page 56: ......
Page 78: ...22 Fig 3 24...
Page 81: ...25 Fig 3 26...
Page 88: ...32 Fig 3 31...
Page 96: ...40 Fig 3 39 Fig 3 40 Fig 3 41...
Page 112: ...56 Fig 3 62 Set up VLAN Tag Priority Mapping Finish...
Page 119: ...63 Fig 3 67 Ingress Port Fig 3 68...
Page 121: ...65 Fig 3 70...
Page 122: ...66 Fig 3 71 Fig 3 72 Fig 3 73 ARP...
Page 123: ...67 Fig 3 74 ARP Fig 3 75 ARP Fig 3 76 ARP Fig 3 77 ARP...
Page 124: ...68 Fig 3 78 ARP Fig 3 79 ARP Fig 3 80 ARP Fig 3 81 ARP...
Page 125: ...69 Fig 3 82 ARP Fig 3 83 ARP Fig 3 84 ARP Fig 3 85 ARP Fig 3 86 ARP...
Page 126: ...70 Fig 3 87 IPv4 Fig 3 88 IPv4 Fig 3 89 IPv4...
Page 127: ...71 Fig 3 90 IPv4 Fig 3 91 IPv4 Fig 3 92 IPv4 Fig 3 93 IPv4 Fig 3 94 IPv4...
Page 128: ...72 Fig 3 95 IPv4 Fig 3 96 IPv4 Fig 3 97 IPv4 Fig 3 98 IPv4 Fig 3 99 IPv4...
Page 129: ...73 Fig 3 100 IPv4 Fig 3 101 IPv4 Fig 3 102 IPv4...
Page 130: ...74 Fig 3 103 IPv4 Fig 3 104 IPv4 Fig 3 105 IPv4...
Page 131: ...75 Fig 3 106 IPv4 Fig 3 107 IPv4 Fig 3 108 IPv4...
Page 132: ...76 Fig 3 109 IPv4 Fig 3 110 IPv4 Fig 3 111 IPv4...
Page 133: ...77 Fig 3 112 IPv4 Fig 3 113 IPv4 Fig 3 114 IPv4...
Page 134: ...78 Fig 3 115 IPv4 Fig 3 116 IPv4 Fig 3 117 Action...
Page 135: ...79 Fig 3 118 Rate Limiter Fig 3 119 Port Copy...
Page 136: ...80 Fig 3 120 DMAC Filter Fig 3 121 VLAN ID Filter Fig 3 122 VLAN ID Filter...
Page 148: ...92 Fig 3 125 Set up Policy Rules Fig 3 126 Set up Policy Rules Fig 3 127 Set up Policy Rules...
Page 150: ...94 Fig 3 131 Set up Port Policies Fig 3 132 Set up Port Policies Finish...
Page 164: ...108 Fig 3 143 802 1X Server Configuration...
Page 168: ...112 Fig 3 145 802 1X Status...
Page 194: ...138 Fig 3 161 Mirror Configuration...
Page 214: ...158 Fig 4 1 Fig 4 2 LGB1005A R2 LGB1005A R2 LGB1005A R2 LGB1005A R2...