- Setting up SNMPv3
- Removing SNMPv3
- Troubleshooting SNMPv3
- Setup monitoring for wireless access points
- Setup monitoring for Solarwinds User Device Tracker or any network topology application
- Command: Enable
- Command: Config T
- Create the View
- Command: SNMP-Server view TestSNMPv3View Internet included
- ASA Command does not exist, this will default to standard view
- Included MIB Family is included in the view
- Excluded MIB Family is excluded from the view
- Create the Group
- Command: SNMP-Server group TestSNMPv3Group v3 priv Read TestSNMPv3View Write TestSNMPv3View
- Command (ASA Only): SNMP-Server group TestSNMPv3Group v3 priv Read
- v1: Group using the v1 security model
- v2c: Group using the v2c security model
- v3: Group using the User security model (SNMPv3)
- Auth: Group using the authNoPriv Security Model
- Noauth: Group using the noAuthNoPriv Security Model
- Priv: Group using the authPriv Security Model
- Access: Specify an access-list associated with this group
- Context: Specify a context to associate these views for the group
- Notify: Specify a notify view for the Group – Send a syslog every time a view is touched
- Read: Specify a read view for the group
- Write: Specify a write view for the group
- Create a User
- Command (same for ASA): SNMP-Server user TestSNMPv3User TestSNMPv3Group v3 auth md5 P@$$w0rd priv DES P@$$w0rd
- Remote: Specify a remote SNMP entity to which the user belongs
- v1: Group using the v1 security model
- v2c: Group using the v2c security model
- v3: Group using the User security model (SNMPv3)
- Access: Specify an access-list associated with this group
- Auth: Authentication parameters for the user
- Encrypted: Specifying passwords as MD5 or SHA digests
- MD5: Use HMAC MD5 algorithm for authentication
- SHA: Use HMAC SHA algorithm for authentication
- 3DES: Use 168 bit 3DES algorithm for encryption
- AES: Use AES algorithm for encryption
- DES: Use 56 but DES algorithm for encryption
- Send to Destination Host (ASA Only)
- Command (ASA Only): SNMP-Server Host inside 10.10.1.1 version 3 TestSNMPv3Group
- inside Name of interface Vlan1
- outside Name of interface Vlan2
- Example of the configuration from start to finish:
- Standard Cisco:
- Cisco ASA:
- Adding the device in Orion:
- Important Commands to use to Remove existing configurations, please use ? for more options:
- No snmp-server group
- No snmp-server user
- No snmp-server host
- Command: Show snmp view
- Views - contained in groups
- Views define what MIBs are available on the Device
- The view name we are looking for here is TestSNMPv3View, and you can see it includes everything from Internet down
- MIB Iso is 1. and below
- Command: Show snmp group
- Group view associates from the TestSNMPv3Group is the following:
- Read view: TestSNMPv3View
- Write View: TestSNMPv3View
- Security Model: v3 priv
- Command: show snmp user
- Looking at the User TestSNMPv3User, it is assigned to the group TestSNMPv3Group.
- Command: Show run | grep SNMP
- Shows the current SNMP Configuration (note none is listed, so this is no config)
- Shows the current SNMP Configuration. Note that this is the exact same configuration as in step 7, and the password is encrypted.
- Also Note the Host and the Interface it is going out on
- Add the following while in Configuration Terminal:
- Command: snmp-server host 10.10.1.6 version 3 auth TestSNMPv3User version 3
- The authentication must match the same as the SNMPv3 configuration
- You can add the following on the same command line to generate Traps:
- Check the Log File:
- Server 2008:
- C:\ProgramData\Solarwinds\Logs\Orion\TrapService.log
- Server 2003
- C:\Documents and Settings\All Users\Application Data\Solarwinds\Logs\Orion\TrapService.log
- If you see the following Error please see This KB
- Command: SNMP-Server view TestSNMPv3View ieee802dot11 included
- Command: snmp-server group OurGroupName v3 priv context vlan-3
- Command: snmp-server group OurGroupName v3 priv context vlan-10
- Command: snmp-server group OurGroupName v3 priv context vlan-41
Configuring SNMPv2 is pretty simple. All you need to monitor is SNMP-Server community public RO. SNMPv3 is a whole new beast, but I have taken the pain points out with this document I created to get monitoring setup for your devices. This is for Cisco devices, but I have been told that Brocade and a few other vendors use similar configurations.
This post will cover
Setup SNMPv3
This is for Basic setup. If you are looking
for a more secure setup, you will need to contact Cisco. This document was
only designed to get the device monitored and to troubleshoot any Issues.
Reference: SNMPv3
TestSNMPv3View is the View Name
If
you see %Bad OID, then Internet does not exist, use ISO (if exists), or 1.3.6
TestSNMPv3Group is the Group Name
TestSNMPv3User is the User Name
Note:
10.10.1.1 is the destination host that is able to monitor the Device, if the
IP Address of Solarwinds NPM is not in the list, then you will not be able to
add the Device
Cisco:enable
Cisco#config
t
Enter
configuration commands, one per line.
End with CNTL/Z.
Cisco(config)#SNMP-Server
view TestSNMPv3View internet included
Cisco(config)#SNMP-Server
group TestSNMPv3Group v3 priv Read TestSNMPv3View Write TestSNMPv3View
Cisco(config)#SNMP-Server
user TestSNMPv3User TestSNMPv3Group v3 auth MD5 P@$$w0rd priv DES P@$$w0rd
Cisco:enable
Cisco#config
t
Cisco(config)#
SNMP-Server group TestSNMPv3Group v3 priv
Cisco(config)#
SNMP-Server user TestSNMPv3User TestSNMPv3Group v3 auth MD5 P@$$w0rd priv DES
P@$$w0rd
Cisco(config)#
SNMP-Server Host inside 10.10.1.1 version 3 TestSNMPv3User
Note:
Do not initially add Read/Write Credentials, then select Test.
Removing SNMPv3 Configuration
Troubleshooting SNMPv3 Configuration
Troubleshooting an ASA
Note: Show SNMP View does not work on
ASA Devices, you will use def_read_view as the view
SNMPv3 Traps (Orion Core 2011.2 and higher )
Note: This assumes that you have setup and
configured SNMPv3 on the device already.
config syslog
aaa_server snmp ( these are basic Trap types sent.)
Troubleshooting SNMPv3 Traps.
ERROR TrapService.TrapService - Bad trap packet
received from Node with IP <IP of Device>. Error description : Security
level is set to 2 but no encryption password was provided.
View Wireless Information
Add to your current
View:
Solarwinds User Device Tracker Module, or any Network Topology setup
While everything
works by default on SNMPv2, you will need to add new commands to the Cisco
devices to expose per VLAN values for this MIB. According to Cisco, SNMPv2 and
SNMPv3 work quite differently when polling the BRIDGE-MIB which contains these
layer 2 values. There is no single command that will expose all existing
VLANs. If on a certain switch you have devices on VLANs 3, 10, and 41, you
needed to add these commands:
No comments:
Post a Comment