User's Manual
14-7
Cisco 3200 Series Wireless MIC Software Configuration Guide
OL-7734-02
Chapter 14 Configuring SNMP
Configuring SNMP
To disable access for an SNMP community, set the community string for that community to the null
string (do not enter a value for the community string). To remove a specific community string, use the
no snmp-server community string global configuration command.
This example shows how to assign the strings open and ieee to SNMP, to allow read-write access for
both, and to specify that open is the community string for queries on non-IEEE802dot11-MIB objects
and ieee is the community string for queries on IEEE802dot11-mib objects:
bridge(config)# snmp-server view dot11view ieee802dot11 included
bridge(config)# snmp-server community open
rw
bridge(config)# snmp-server community ieee view ieee802dot11 rw
Configuring Trap Managers and Enabling Traps
A trap manager is a management station that receives and processes traps. Traps are system alerts that
the device generates when certain events occur. By default, no trap manager is defined, and no traps are
issued.
Bridges running this IOS release can have an unlimited number of trap managers. Community strings
can be any length.
Table 14-3 describes the supported traps (notification types). You can enable any or all of these traps and
configure a trap manager to receive them.
Step 3
access-list access-list-number
{deny | permit} source [source-wildcard]
(Optional) If you specified an IP standard access list number in
Step 2, then create the list, repeating the command as many times
as necessary.
• For access-list-number, enter the access list number specified
in Step 2.
• The deny keyword denies access if the conditions are
matched. The permit keyword permits access if the conditions
are matched.
• For source, enter the IP address of the SNMP managers that
are permitted to use the community string to gain access to the
agent.
• (Optional) For source-wildcard, enter the wildcard bits in
dotted decimal notation to be applied to the source. Place ones
in the bit positions that you want to ignore.
Recall that the access list is always terminated by an implicit deny
statement for everything.
Step 4
end Return to privileged EXEC mode.
Step 5
show running-config Verify your entries.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose