Specifications

73
DCS-3950 series Ethernet switch manual
Disable RMON.
Switch(config)#no rmon enable
5.4.5 Typical SNMP Configuration Example
The IP address of the NMS is 1.1.1.5; the IP address of the switch (Agent) is 1.1.1.9
Scenario 1: The NMS network administrative software uses SNMP protocol to obtain data
from the switch.
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(Config)#snmp-server community rw private
Switch(Config)#snmp-server community ro public
Switch(Config)#snmp-server securityip 1.1.1.5
The NMS can use ‘private’ as the community string to access the switch with read-write
permission, or use ‘public’ as the community string to access the switch with read-only
permission.
Scenario 2: NMS will receive Trap messages from the switch (Note: NMS may have
community string verification for the Trap messages. In this scenario, the NMS uses a
Trap verification community string of ‘trap’).
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(Config)#snmp-server host 1.1.1.5 v1 trap
Switch(Config)#snmp-server enable traps
Scenario 3: NMS uses SNMP v3 to obtain information from the switch.
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch (Config)#snmp-server user tester Group encrypted auth md5 hello
Switch (Config)#snmp-server group Group AuthPriv read max write max notify max
Switch (Config)#snmp-server view max 1 include
Scenario 4: NMS wants to receive the v3Trap messages sent by the switch.
The configuration on the switch is listed below:
Switch(config)#snmp-server enable
Switch(config)#snmp-server host 10.1.1.2 v3 AuthPriv tester
Switch(config)#snmp-server enable traps
5.4.6 SNMP Troubleshooting