Brocade Network Advisor SAN User Manual v11.1x (53-1002167-01, May 2011)

778 Brocade Network Advisor SAN User Manual
53-1002167-01
SAN performance overview
27
SAN Performance management requirements
To collect performance data, make sure the following requirements have been met:
Make sure the snmp access control list for the device is empty or the Management application
server IP is in the access control list.
Example of default access control list
FCRRouter:admin> snmpconfig --show accesscontrol
SNMP access list configuration:
Entry 0: No access host configured yet
Entry 1: No access host configured yet
Entry 2: No access host configured yet
Entry 3: No access host configured yet
Entry 4: No access host configured yet
Entry 5: No access host configured yet
Example of Management application Server IP included in access control list
FCRRouter:admin> snmpconfig --show accesscontrol
SNMP access list configuration:
Entry 0: Access host subnet area 172.26.1.86 (rw)
Entry 1: No access host configured yet
Entry 2: No access host configured yet
Entry 3: No access host configured yet
Entry 4: No access host configured yet
Entry 5: No access host configured yet
To add the Management application server IP address to the access control list, use the
snmpconfig --add accesscontrol command:
To set the default access control, use the
snmpconfig --default accesscontrol command:
Make sure that the SNMP credentials in the Management application match the SNMP
credentials on the device.
- To check the SNMP v1 credentials on the device, use the snmpconfig --show snmpv1
command.
Example of SNMP v1
HCLSwitch:admin> snmpconfig --show snmpv1
SNMPv1 community and trap recipient configuration:
Community 1: Secret C0de (rw)
Trap recipient: 10.103.4.63
Trap port: 162
Trap recipient Severity level: 4
Community 2: OrigEquipMfr (rw)
Trap recipient: 10.191.12.240
Trap port: 162
Trap recipient Severity level: 4
Community 3: private (rw)
Trap recipient: 10.103.5.105
Trap port: 162
Trap recipient Severity level: 4
Community 4: public (ro)
Trap recipient: 192.168.102.41
Trap port: 162
Trap recipient Severity level: 4
Community 5: common (ro)
Trap recipient: 10.32.150.116