Simple Network Management Protocol
Configuring SNMP
6
Cisco 3200 Series Wireless MIC Software Configuration Guide
To disable access for an SNMP community, set the community string for that community to the null
string (do not enter a value for the community string). To remove a specific community string, use the
no snmp-server community
string
global configuration command.
This example shows how to assign the strings
open
and
ieee
to SNMP, to allow read-write access for
both, and to specify that
open
is the community string for queries on non-IEEE802dot11-MIB objects
and
ieee
is the community string for queries on IEEE802dot11-mib objects:
bridge(config)#
snmp-server view dot11view ieee802dot11 included
bridge(config)#
snmp-server community open
rw
bridge(config)#
snmp-server community ieee view ieee802dot11 rw
Configuring Trap Managers and Enabling Traps
A trap manager is a management station that receives and processes traps. Traps are system alerts that
the device generates when certain events occur. By default, no trap manager is defined, and no traps are
issued.
Bridges running this IOS release can have an unlimited number of trap managers. Community strings
can be any length.
Table 3
describes the supported traps (notification types). You can enable any or all of these traps and
configure a trap manager to receive them.
Step 3
access-list
access-list-number
{
deny
|
permit
}
source
[
source-wildcard
]
(Optional) If you specified an IP standard access list number in
Step 2, then create the list, repeating the command as many times
as necessary.
•
For
access-list-number
, enter the access list number specified
in Step 2.
•
The
deny
keyword denies access if the conditions are
matched. The
permit
keyword permits access if the conditions
are matched.
•
For
source
, enter the IP address of the SNMP managers that
are permitted to use the community string to gain access to the
agent.
•
(Optional) For
source-wildcard
, enter the wildcard bits in
dotted decimal notation to be applied to the source. Place ones
in the bit positions that you want to ignore.
Recall that the access list is always terminated by an implicit deny
statement for everything.
Step 4
end
Returns to privileged EXEC mode.
Step 5
show running-config
Verifies your entries.
Step 6
copy running-config startup-config
(Optional) Saves your entries in the configuration file.
Command
Purpose
Содержание 3200 Series
Страница 14: ...xiv Cisco 3200 Series Wireless MIC Software Configuration Guide OL 6415 04 ...
Страница 120: ...Administering the WMIC Managing the System Time and Date 56 Cisco 3200 Series Wireless MIC Software Configuration Guide ...
Страница 136: ...Dynamic Frequency Selection Additional Information 6 Radio Channels and Transmit Frequencies OL 11491 03 ...
Страница 254: ...WIMIC Troubleshooting Error and Event Messages 12 Cisco 3200 Series Wireless MIC Software Configuration Guide ...
Страница 272: ...Supported MIBs Using FTP to Access the MIB Files 4 Cisco 3200 Series Wireless MIC Software Configuration Guide ...
Страница 314: ...Index IN 12 Cisco 3200 Series Wireless MIC Software Configuration Guide OL 6415 04 ...