Foundry Switch and Router Installation and Configuration Guide
10 - 6
December 2000
To add a trap receiver and configure the software to encrypt display of the community string in the CLI and Web
management interface, enter commands such as the following:
BigIron(config)# snmp-server host 2.2.2.2 0 BigIron-12
BigIron(config)# write memory
The command in the example above adds trap receiver 2.2.2.2 and configures the software to display the
community string associated with the receiver in the clear. When you save the new community string to the
startup-config file, the software adds the following command to the file:
snmp-server host 2.2.2.2 0 BigIron-12
USING THE WEB MANAGEMENT INTERFACE
1.
Log on to the device using a valid user name and password for read-write access.
2.
Click the Management link to display the Management configuration panel.
3.
Click the Trap Receiver link to display the Trap Receiver panel.
4.
Enter the IP address of the receiver in the IP Address field.
5.
Enter the community string you want the Layer 3 Switch to send in traps sent to this host in the Community
String field.
6.
Select the Encrypt checkbox to remove the checkmark if you want to disable encryption of the string display.
Encryption prevents other users from seeing the string in the CLI or Web management interface. If you
disable encryption, other users can view the community string. Encryption is enabled by default.
To re-enable encryption, select the checkbox to place a checkmark in the box.
7.
Click Add to apply the change to the device’s running-config file.
8.
Select the Save link at the bottom of the panel. Select Yes when prompted to save the configuration change
to the startup-config file on the device’s flash memory.
Specifying a Single Trap Source
You can specify a single trap source to ensure that all SNMP traps sent by the Foundry device use the same
source IP address. When you configure the SNMP source address, you specify the Ethernet port, POS port,
loopback interface, or virtual interface that is the source for the traps. The Foundry device then uses the first IP
address configured on the port or interface as the source IP address in the SNMP traps sent by the device.
Identifying a single source IP address for SNMP traps provides the following benefits:
•
If your trap receiver is configured to accept traps only from specific links or IP addresses, you can use this
feature to simplify configuration of the trap receiver by configuring the Foundry device to always send the
traps from the same link or source address.
•
If you specify a loopback interface as the single source for SNMP traps, SNMP trap receivers can receive
traps regardless of the states of individual links. Thus, if a link to the trap receiver becomes unavailable but
the receiver can be reached through another link, the receiver still receives the trap, and the trap still has the
source IP address of the loopback interface.
NOTE:
When you designate an interface as the SNMP trap source for a Foundry device, the software uses the
first IP address configured on the interface as the source IP address for the traps. The first IP address refers to
when the address was configured, not to its numeric sequence relative to other IP addresses configured on the
interface. Thus, the first IP address is not the numerically lowest address, but is instead the IP address configured
on the interface before any other IP addresses were configured on that interface.
To specify a port, loopback interface, or virtual interface whose first configured IP address the Foundry device
must use as the source for all SNMP traps sent by the device, use the following CLI method.
USING THE CLI
To configure the device to send all SNMP traps from the first configured IP address on port 4/11, enter the
following commands:
Summary of Contents for Switch and Router
Page 2: ...December 2000 Copyright 2000 by Foundry Networks Inc ...
Page 26: ...Foundry Switch and Router Installation and Configuration Guide xxvi December 2000 ...
Page 64: ...Foundry Switch and Router Installation and Configuration Guide 2 34 December 2000 ...
Page 162: ...Foundry Switch and Router Installation and Configuration Guide 5 38 December 2000 ...
Page 196: ...Foundry Switch and Router Installation and Configuration Guide 6 34 December 2000 ...
Page 208: ...Foundry Switch and Router Installation and Configuration Guide 7 12 December 2000 ...
Page 236: ...Foundry Switch and Router Installation and Configuration Guide 8 28 December 2000 ...
Page 258: ...Foundry Switch and Router Installation and Configuration Guide 9 22 December 2000 ...
Page 420: ...Foundry Switch and Router Installation and Configuration Guide 13 32 December 2000 ...
Page 442: ...Foundry Switch and Router Installation and Configuration Guide 14 22 December 2000 ...
Page 554: ...Foundry Switch and Router Installation and Configuration Guide 15 112 December 2000 ...
Page 574: ...Foundry Switch and Router Installation and Configuration Guide 16 20 December 2000 ...
Page 626: ...Foundry Switch and Router Installation and Configuration Guide 17 52 December 2000 ...
Page 682: ...Foundry Switch and Router Installation and Configuration Guide 18 56 December 2000 ...
Page 826: ...Foundry Switch and Router Installation and Configuration Guide 20 20 December 2000 ...
Page 994: ...Foundry Switch and Router Installation and Configuration Guide 26 10 December 2000 ...
Page 1004: ...Foundry Switch and Router Installation and Configuration Guide B 6 December 2000 ...
Page 1044: ...Foundry Switch and Router Installation and Configuration Guide C 40 December 2000 ...
Page 1048: ...Foundry Switch and Router Installation and Configuration Guide D 4 December 2000 ...
Page 1070: ...Foundry Switch and Router Installation and Configuration Guide Index 18 December 2000 ...