SNMP的原理及案例


SNMPSimple Network Management ProtocolSNMPSNMPSNMPUDPSNMPV1V2CV3V1V2CCommunity NameSNMP NMSSNMP AgentMIBManagementInformation BaseMIBwritereadV3V1V2CV3V1V2CSNMPMIB
SNMPNMSAgentNMSNetwork Management StationQuidViewSun NetManagercisco workershp openviewIBM NetViewAgentNMSAgentGetRequestGetNextRequestSetRequestAgentNMSReadWriteResponseNMSAgentNMSTrapNMSTrapNMS
windows 2003 PCH3C SecPath F100-C2S2000PCWhat’s_up_Gold_v8.01SNMP NMSWebWhat’s_up_Gold_v8.01http://http://down.51cto.com/data/10127NMSwww
IpFirewall 1Eth0192.168.2.1/24Eth510.0.0.1/8Firewall 2Eth0192.168.3.1/24Eth510.0.0.2/8switchVlan-interface 1192.168.3.2/24NMS192.168.2.100/24WWW192.168.3.100/24
FW-1[H3C]sysname fw-1[fw-1]int eth0/0[fw-1-Ethernet0/0]ip add 192.168.2.1 24[fw-1-Ethernet0/0]int eth0/4[fw-1-Ethernet0/4]ip add 10.0.0.1 8[fw-1-Ethernet0/4]%Aug 26 03:56:49:783 2013 fw-1 IFNET/4/UPDOWN:Lineprotocol on the interface Ethernet0/4 is UP [fw-1-Ethernet0/4]q[fw-1]ip route-static 192.168.3.0 24 10.0.0.2 3.0[fw-1]firewall zone untrust [fw-1-zone-untrust]add int eth0/4 eth0/4untrust[fw-1]snmp-agent snmp-agent[fw-1]snmp-agent community read public [fw-1]snmp-agent community write private [fw-1]snmp-agent sys-info contact zhangsan [fw-1]snmp-agent sys-info location jifang-1 [fw-1]snmp-agent sys-info version all snmp[fw-1]snmp-agent trap enable [fw-1]snmp-agent target-host trap address udp-domain192.168.2.100 params securityname public [fw-1]snmp-agent trap enable standard linkdown linkupwarmstart
FW-2[H3C]sysname ^[H3C]sysname fw-2[fw-2]int eth0/0[fw-2-Ethernet0/0]ip add 192.168.3.1 24[fw-2-Ethernet0/0]%Aug 25 18:18:18:944 2013 fw-2 IFNET/4/UPDOWN:Lineprotocol on the inter免费云主机域名face Ethernet0/0 is UP [fw-2-Ethernet0/0]int eth0/4[fw-2-Ethernet0/4]ip add 10.0.0.2 8[fw-2-Ethernet0/4]%Aug 25 18:18:53:693 2013 fw-2 IFNET/4/UPDOWN:Lineprotocol on the interface Ethernet0/4 is UP [fw-2-Ethernet0/4]q[fw-2]ip route-static 192.168.2.0 24 10.0.0.1[fw-2]firewall zone untrust [fw-2-zone-untrust]add int eth0/4[fw-2]snmp-agent[fw-2]snmp-agent community read public [fw-2]snmp-agent community write private[fw-2]snmp-agent sys-info contact lisi [fw-2]snmp-agent sys-info location jifang-2 [fw-2]snmp-agent sys-info version all[fw-2]snmp-agent trap enable[fw-2]snmp-agent target-host trap address udp-domain192.168.2.100 params securityname public[fw-2]snmp-agent trap enable standard linkdown linkupwarmstart

sw[Quidway]sysname SW[SW]int Vlan-interface 1[SW-Vlan-interface1]%Apr 209:19:40:383 2000 SW L2INF/5/VLANIF LINK STATUS CHANGE:- 1 – Vlan-interface1: is UP
[SW-Vlan-interface1]ip add 192.168.3.2 24[SW-Vlan-interface1]%Apr 209:19:50:405 2000 SW IFNET/5/UPDOWN:- 1 -Line protocol on the interfaceVlan-interface1 is UP [SW-Vlan-interface1]q[SW]ip route-static 0.0.0.0 0 192.168.3.1 [SW]snmp-agent[SW]snmp-agent community read public[SW]snmp-agent community write private [SW]snmp-agent sys-info contact lisi [SW]snmp-agent sys-info location jifang-2 [SW]snmp-agent sys-info version all[SW]snmp-agent trap enable[SW]snmp-agent target-host trap address udp-domain192.168.2.100 params securityname public[SW]snmp-agent trap enable standard linkdown linkupwarmstartSW]local-user admin New local user added.[SW-luser-admin]password cipher admin [SW-luser-admin]service-type telnet level 3 [SW-luser-admin]q[SW]user-interface vty 0 4 [SW-ui-vty0-4]authentication-modescheme scheme
www,snmp

netstatna |more
PCSNMP AgentSNMP NMS162netstat na|moreAgentAgentIISweb
NMSsnmppc162What’s_up_Gold_v8.01PC
file new map wizard



telentweb

相关推荐: 关于https证书自签名和https双向认证的简介

这篇文章主要介绍关于https证书自签名和https双向认证的简介,文中介绍的非常详细,具有一定的参考价值,感兴趣的小伙伴们一定要看完!一、https证书自签名我们先来了解一下https证书自签名,它是一种免费的安全证书,它是不受浏览器信任,我们如果使用了这样…

免责声明:本站发布的图片视频文字,以转载和分享为主,文章观点不代表本站立场,本站不承担相关法律责任;如果涉及侵权请联系邮箱:360163164@qq.com举报,并提供相关证据,经查实将立刻删除涉嫌侵权内容。

(0)
打赏 微信扫一扫 微信扫一扫
上一篇 01/31 11:36
下一篇 01/31 11:36