SNMP Community String Indexing
|
|
- Philippa McLaughlin
- 7 years ago
- Views:
Transcription
1 SNMP Community String Indexing Document ID: Contents Introduction Prerequisites Requirements Components Used Conventions Community String Indexing The BRIDGE MIB Procedure Related Information Introduction This document describes how to use Simple Network Management Protocol (SNMP) community string indexing on Catalyst switches. Prerequisites Requirements There are no specific requirements for this document. Components Used This document applies to all Catalyst switches that run regular Catalyst OS or Catalyst IOS which support the BRIDGE MIB. The example in this document usas a Catalyst 5500 that runs 5.5(4) code. The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions. Community String Indexing Some standard MIBs assume that a particular SNMP entity contains only one instance of the MIB. Thus, the standard MIB does not have any index that allows you to directly access an instance of the MIB. In these cases, a community string indexing is provided to access each instance of the standard MIB. The syntax is [community string]@[instance number]. For example, the Catalyst switch includes one instance of the standard BRIDGE MIB for each VLAN in the switch. If the read only community string is public and the read write community string is private, you can use public@25 to read the BRIDGE MIB for VLAN 25 and use private@33 to read and write the BRIDGE MIB for VLAN 33. If just public or private is used, the BRIDGE MIB for VLAN 1 is accessed.
2 Traps sent from a MIB that is indexed by community string also indicate which instance of the MIB it corresponds to by using community string indexing. For example, a newroot trap from the BRIDGE MIB for VLAN 25 would have a community string of public@25 (assuming the read only community string is public). Note: Community string indexing does not affect access to MIBs that have only one instance. Thus, public@25 can be used to access RFC1213 MIB at the same time the BRIDGE MIB for VLAN 25 is accessed. Another example for the Catalyst switches is the SNMP REPEATER MIB. Use [community string]@[module number/port number] to access this MIB for a particular repeater in the Catalyst switch. For example, if the read only community string is public, you could use public@3/1 to read the SNMP REPEATER MIB for the repeater attached to port 1 on module 3. The BRIDGE MIB One MIB that uses community string indexing is the BRIDGE MIB. Procedure Complete these steps in order to get dynamic CAM entries. This example uses the Catalyst For comparison, gather the output from the show cam dynamic command. The Catalyst code that runs in this example is release 5.5(4): CAT5500 (enable) show cam dynamic * = Static Entry. + = Permanent Entry. # = System Entry. R = Router Entry. X = Port Security Entry VLAN Dest MAC/Route Des [CoS] Destination Ports or VCs / [Protocol Type] 1 00 e0 b /23 24 [ALL] c 01 a4 3e 11/23 24 [ALL] c /2 [ALL] ca 15 9d 08 7/2 [ALL] e /2 [ALL] c 7/5 [ALL] c 31 d0 a5 11/5 [ALL] c f0 1b 7a 7/11 [ALL] c 01 b8 aa 11/23 24 [ALL] f6 5f /1 [ALL] c /2 [ALL] c 7/6 [ALL] 1 00 d /2 [ALL] b4 fe 81 11/7 [ALL] e4 af 00 11/23 24 [ALL] c f4 eb 7a 7/2 [ALL] d1 9f 6c 00 11/23 24 [ALL] c 34 a1 0b 11/23 24 [ALL] 1 00 d0 02 0c 17 ff 7/2 [ALL] f /7 [ALL] f 78 bb fd 11/23 24 [ALL] f 78 bb ff 11/23 24 [ALL] f 78 bb fe 11/23 24 [ALL] c 2c 83 cd 7/2 [ALL] b4 fe 81 11/7 [ALL] c /23 24 [ALL] c 01 1c 5a 11/23 24 [ALL] f2 fc 38 c0 11/23 24 [ALL] b4 fe 81 11/7 [ALL]
3 /8 [ALL] Total Matching CAM Entries Displayed = 30 Get the MAC address table dot1dtpfdbaddress ( ). snmpwalk public iso = Hex C 34 A1 0B.iso = Hex C iso = Hex C iso = Hex C F0 1B 7A.iso = Hex C F4 EB 7A.iso = Hex B4 FE 81.iso = Hex E4 AF 00.iso = Hex iso = Hex E iso = Hex B F6 5A 44.iso = Hex C 2C 83 CD.iso = Hex F6 5F iso = Hex C.iso = Hex C.iso = Hex F2 FC 38 C0.iso = Hex CA 15 9D 08.iso = Hex F 78 BB FD.iso = Hex F 78 BB FE.iso = Hex F 78 BB FF.iso = Hex D1 9F 6C 00.iso = Hex C 01 1C 5A.iso = Hex C iso = Hex C 01 A4 3E.iso = Hex C 01 B8 AA.iso = Hex F iso = Hex 00 D0 02 0C 17 FF.iso = Hex 00 D iso = Hex 00 E0 B Get the bridge port number, dot1dtpfdbport ( ). snmpwalk public iso = 844.iso = 386.iso = 386.iso = 395.iso = 386.iso = 647.iso = 844.iso = 392.iso = 386.iso = 844.iso = 386.iso = 385.iso = 390.iso = 389.iso = 844.iso = 386.iso = 844.iso = 844.iso = 844.iso = 844.iso = 844.iso = 844.iso = 844.iso = 844.iso = 391.iso = 386.iso = 386.iso = 844
4 Get the bridge port to ifindex mapping, dot1dbaseportifindex ( ). snmpwalk public iso = 288.iso = 289.iso = 291.iso = 292.iso = 294.iso = 295.iso = 296.iso = 9.iso = 11.iso = 12.iso = 13.iso = 14.iso = 15.iso = 16.iso = 17.iso = 18.iso = 19.iso = 20.iso = 21.iso = 22.iso = 23.iso = 24.iso = 25.iso = 26.iso = 27.iso = 28.iso = 29.iso = 30.iso = 31.iso = 297.iso = 298.iso = 299.iso = 300.iso = 301.iso = 302.iso = 303.iso = 304.iso = 305.iso = 307.iso = 308.iso = 34.iso = 459.iso = 460.iso = 461.iso = 462.iso = 463.iso = 464.iso = 465.iso = 466.iso = 467.iso = 468.iso = 469.iso = 470.iso = 375.iso = 376.iso = 377.iso = 378.iso = 380.iso = 381.iso = 382.iso = 383.iso = 384
5 4..iso = 385.iso = 386.iso = 387.iso = 388.iso = 389.iso = 390.iso = 391.iso = 392.iso = 393.iso = 394.iso = 395.iso = Walk the ifname ( ). snmpwalk public iso = "sc0" Hex iso = "sl0" Hex 73 6C 30.iso = "VLAN 1".iso = "VLAN 1002".iso = "VLAN 1004".iso = "VLAN 1005".iso = "VLAN 1003".iso = "4/1" Hex 34 2F 31.iso = "4/2" Hex 34 2F 32.iso = "4/3" Hex 34 2F 33.iso = "4/4" Hex 34 2F 34.iso = "4/5" Hex 34 2F 35.iso = "4/6" Hex 34 2F 36.iso = "4/7" Hex 34 2F 37.iso = "4/8" Hex 34 2F 38.iso = "4/9" Hex 34 2F 39.iso = "4/10" Hex 34 2F iso = "4/11" Hex 34 2F iso = "4/12" Hex 34 2F iso = "4/13" Hex 34 2F iso = "4/14" Hex 34 2F iso = "4/15" Hex 34 2F iso = "4/16" Hex 34 2F iso = "4/17" Hex 34 2F iso = "4/18" Hex 34 2F iso = "4/19" Hex 34 2F iso = "4/20" Hex 34 2F iso = "4/21" Hex 34 2F iso = "4/22" Hex 34 2F iso = "4/23" Hex 34 2F iso = "4/24" Hex 34 2F iso = "3/1" Hex 33 2F 31.iso = "3/2" Hex 33 2F 32.iso = "3/3" Hex 33 2F 33.iso = "3/4" Hex 33 2F 34.iso = "3/5" Hex 33 2F 35.iso = "3/6" Hex 33 2F 36.iso = "3/7" Hex 33 2F 37.iso = "3/8" Hex 33 2F 38.iso = "3/9" Hex 33 2F 39.iso = "7/1" Hex 37 2F 31.iso = "7/2" Hex 37 2F 32.iso = "7/3" Hex 37 2F 33.iso = "7/4" Hex 37 2F 34.iso = "7/5" Hex 37 2F 35.iso = "7/6" Hex 37 2F 36.iso = "7/7" Hex 37 2F 37.iso = "7/8" Hex 37 2F 38.iso = "7/9" Hex 37 2F 39.iso = "7/10" Hex 37 2F iso = "7/11" Hex 37 2F 31 31
6 .iso = "7/12" Hex 37 2F iso = "11/1" Hex F 31.iso = "11/2" Hex F 32.iso = "11/3" Hex F 33.iso = "11/4" Hex F 34.iso = "11/5" Hex F 35.iso = "11/6" Hex F 36.iso = "11/7" Hex F 37.iso = "11/8" Hex F 38.iso = "11/9" Hex F 39.iso = "11/10".iso = "11/11".iso = "11/12".iso = "11/13".iso = "11/14".iso = "11/15".iso = "11/16".iso = "11/17".iso = "11/18".iso = "11/19".iso = "11/20".iso = "11/21".iso = "11/22".iso = "11/23".iso = "11/24".iso = "VLAN 100".iso = "VLAN 2".iso = "VLAN 32".iso = "VLAN 200".iso = "VLAN 3".iso = "VLAN 284".iso = "VLAN 66".iso = "VLAN 22".iso = "VLAN 4".iso = "VLAN 5".iso = "VLAN 300".iso = "VLAN 400".iso = "VLAN 88".iso = "VLAN 89".iso = "VLAN 99".iso = "VLAN 30".iso = "VLAN 999".iso = "VLAN 20".iso = "VLAN 40".iso = "9/1" Hex 39 2F 31.iso = "9/2" Hex 39 2F 32.iso = "9/3" Hex 39 2F 33.iso = "9/4" Hex 39 2F 34.iso = "9/5" Hex 39 2F 35.iso = "9/6" Hex 39 2F 36.iso = "9/7" Hex 39 2F 37.iso = "9/8" Hex 39 2F 38.iso = "9/9" Hex 39 2F 39.iso = "9/10" Hex 39 2F iso = "9/11" Hex 39 2F iso = "9/12" Hex 39 2F iso = "9/13" Hex 39 2F iso = "9/14" Hex 39 2F iso = "9/15" Hex 39 2F iso = "9/16" Hex 39 2F iso = "VLAN 21".iso = "VLAN 6".iso = "VLAN 7".iso = "10/1" Hex F 31.iso = "10/2" Hex F 32.iso = "10/3" Hex F 33
7 .iso = "10/4" Hex F 34.iso = "10/5" Hex F 35.iso = "10/6" Hex F 36.iso = "10/7" Hex F 37.iso = "10/8" Hex F 38.iso = "10/9" Hex F 39.iso = "10/10".iso = "10/11".iso = "10/12".iso = "VLAN 101".iso = "FEC 11/23 24".iso = "6/1" Hex 36 2F 31.iso = "NetFlow Interface" Now you can get the port information, for example: From Step 2:.iso = Hex C From Step 3:.iso = 386 This tells you that this MAC address ( C ) is from bridge port number 386. From Step 4: bridge port number 386 has an ifindex number 298.iso = 298 From Step 5: ifindex 298 corresponds to port 7/2.iso = "7/2" Hex 37 2F 32 Compare that with the output from the show cam dynamic command output in Step 1. You see a match for c /2 [ALL]. There are four VLANs in this example. The show cam dynamic output shows all the addresses, but snmpwalk only shows the ones in VLAN 1. You need to use community string indexing in order to get the entries for each of the VLANs. The syntax to use is: snmpwalk read_community@vlan_number VLAN 1 snmpwalk public@ = Hex B4 FE = Hex E4 AF = Hex = Hex F6 5F = Hex C = Hex C = Hex F2 FC 38 C = Hex F 78 BB FD = Hex F 78 BB FE = Hex F 78 BB FF = Hex D1 9F 4C = Hex E B = Hex C 01 1C 5A = Hex C 01 A4 3E = Hex 00 B C = Hex 00 E0 B VLAN 20: snmpwalk public@
8 = Hex C 31 D0 A = Hex B4 FE 81 VLAN 30: snmpwalk public@ = Hex B4 FE 81 VLAN 50: snmpwalk public@ = Hex B4 FE 81 Related Information SNMP Tech Notes Technical Support & Documentation Cisco Systems Contacts & Feedback Help Site Map Cisco Systems, Inc. All rights reserved. Terms & Conditions Privacy Statement Cookie Policy Trademarks of Cisco Systems, Inc. Updated: Oct 26, 2005 Document ID: 40367
Configuring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
More informationMAC Address Management
D MAC Address Management Contents Overview.................................................... D-2.................................. D-3 Menu: Viewing the Switch s MAC Addresses.................... D-4
More informationCatalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Document ID: 70974 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram
More informationHow To Configure InterVLAN Routing on Layer 3 Switches
How To Configure InterVLAN Routing on Layer 3 Switches Document ID: 41860 Contents Introduction Prerequisites Requirements Components Used Conventions Configure InterVLAN Routing Task Step by Step Instructions
More informationCisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)
Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched
More informationUnity Express Voice Mail Transfer Behavior
Unity Express Voice Mail Transfer Behavior Document ID: 97825 Contents Introduction Prerequisites Requirements Components Used Conventions Problem 1 Calls Transfer to Reception Solution 1 Transfer to AutoAttendant
More informationIOS NAT Load Balancing for Two ISP Connections
IOS NAT Load Balancing for Two ISP Connections Document ID: 100658 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot
More informationConfiguring a Gateway of Last Resort Using IP Commands
Configuring a Gateway of Last Resort Using IP Commands Document ID: 16448 Contents Introduction Prerequisites Requirements Components Used Conventions ip default gateway ip default network Flag a Default
More informationSchool of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 3: Simple Network Management Protocol (SNMP) Operations Objective To become familiar with basic SNMP operations
More informationBRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
More informationConfiguring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS
Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS Document ID: 23408 Contents Introduction Prerequisites Requirements Components
More informationPIX/ASA 7.x with Syslog Configuration Example
PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages
More informationQoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000)
QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706
More informationConfiguring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
More informationPIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example
PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example Document ID: 77869 Contents Introduction Prerequisites Requirements Components Used Related Products
More informationUnity Error Message: Your voicemail box is almost full
Unity Error Message: Your voicemail box is almost full Document ID: 111781 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Delete Voice Mail Messages from
More informationSyslog Server Configuration on Wireless LAN Controllers (WLCs)
Syslog Server Configuration on Wireless LAN Controllers (WLCs) Document ID: 107252 Contents Introduction Prerequisites Requirements Components Used Conventions Syslog Server Support on Wireless LAN Controllers
More informationNetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
More informationEnable SMTP Message Notifications in Cisco Unity Connection 8.x
Enable SMTP Message Notifications in Cisco Unity Connection 8.x Document ID: 113623 Contents Introduction Prerequisites Requirements Components Used Conventions Set up SMTP Message Notifications Configurations
More informationConfiguring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
More informationTable of Contents. Cisco Fault Management of ONS 15454 Using Simple Network Management Protocol
Table of Contents Fault Management of ONS 15454 Using Simple Network Management Protocol...1 Document ID: 5701...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1
More informationConfiguring LACP (802.3ad) Between a Catalyst 6500/6000 and a Catalyst 4500/4000
Configuring LACP (802.3ad) Between a Catalyst 6500/6000 and a Catalyst 4500/4000 Document ID: 19642 Contents Introduction Before You Begin Conventions Prerequisites Components Used Background Theory Difference
More informationChecking SQL Server or MSDE Version and Service Pack Level
Checking SQL Server or MSDE Version and Service Pack Level Document ID: 25784 Contents Introduction Prerequisites Requirements Components Used Conventions Use Query Analyzer with Use Query Analyzer with
More informationNetwork Management 2. Learning Objectives. Centralized network management? School of Business Eastern Illinois University
School of Business Eastern Illinois University 2 (Week 16, Thursday 4/19/2007) Abdou Illia, Spring 2007 Learning Objectives 2 List main elements in Centralized network management Describe Centralized principles
More informationA message from Plixer International:
Scrutinizer Getting Started Guide A message from Plixer International: Thank you for taking the time to download and install Scrutinizer. We believe that Scrutinizer is a useful tool for any Network industry
More informationIOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
More informationHow To Configure Rmon On Cisco Me 2600X On Ios 2.5A (Cisco) With A Network Monitor On A Network Device (Network) On A Pnet 2.2.1 (Network Monitor) On An Ip
Remote Network Monitoring and Alarm Troubleshooting This chapter describes remote network monitoring (RMON) and alarm troubleshooting. RMON Procedures, page 1 Understanding RMON, page 1 Alarm Troubleshooting,
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN Assignment for Avaya 9600 and 1600 Series
More informationTech Note Cisco IOS SNMP Traps Supported and How to Conf
Tech Note Cisco IOS SNMP Traps Supported and How to Conf Table of Contents Cisco IOS SNMP Traps Supported and How to Configure Them...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
More informationThe Purpose and Use of the Configuration Register on All Cisco Routers
The Purpose and Use of the Configuration Register on All Cisco Routers Document ID: 50421 Contents Introduction Prerequisites Requirements Components Used Conventions The Purpose of the Configuration Register
More informationPIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example
PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example Document ID: 69374 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
More informationConfiguring TACACS+, RADIUS, and Kerberos on Cisco Catalyst Switches
Configuring TACACS+, RADIUS, and Kerberos on Cisco alyst Switches Document ID: 13847 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configuration Steps
More informationConfiguring Cisco CallManager IP Phones to Work With IP Phone Agent
Configuring Cisco CallManager IP Phones to Work With IP Phone Agent Document ID: 40564 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration Procedures in Cisco CallManager
More informationPANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
More informationCatalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example
Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
More informationSNMP Version 3. Finding Feature Information. Information About SNMP Version 3. Security Features in SNMP Version 3
The feature provides secure access to devices by authenticating and encrypting data packets over the network. Simple Network Management Protocol version 3 (SNMPv3) is an interoperable, standards-based
More informationLab - Using IOS CLI with Switch MAC Address Tables
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 S2 VLAN 1 192.168.1.12
More informationConfiguring the Switch IP Address and Default Gateway
CHAPTER 3 Configuring the Switch IP Address and Default Gateway This chapter describes how to configure the IP address, subnet mask, and default gateway on the Catalyst enterprise LAN switches. Note For
More informationUnderstanding Simple Network Management Protocol (SNMP) Traps
Understanding Simple Network Management Protocol (SNMP) Traps Document ID: 7244 Contents Introduction Prerequisites Requirements Components Used Conventions Use SNMP Traps Examples of Traps Sent by Cisco
More informationPANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
More informationNetwork Analysis Modules
CHAPTER 6 This chapter describes the (NAMs) and contains the following sections: Network Analysis Module (WS-SVC-NAM-1), page 6-2 Network Analysis Module (WS-SVC-NAM-2), page 6-4 NAMs monitor and analyze
More informationSimple Network Management Protocol
CS 556 - Networks II Internet Teaching Lab (MCS B-24) Simple Network Mgmt Protocol (SNMP) Simple Network Management Protocol What you will learn in this lab: Details of the SNMP protocol. Contents of a
More informationConfigure Backup Server for Cisco Unified Communications Manager
Configure Backup Server for Cisco Unified Communications Manager Document ID: 110309 Contents Introduction Prerequisites Requirements Components Used Conventions Configure a Backup Server for Cisco Unified
More informationCRS 4.x: Automatic Work and Wrap up Time Configuration Example
CRS 4.x: Automatic Work and Wrap up Time Configuration Example Document ID: 91889 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Automatic Work and Wrap up Time
More informationSample Configuration Using the ip nat outside source list C
Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1
More informationConstraining IP Multicast in a Switched Ethernet Network
Constraining IP Multicast in a Switched Ethernet Network This module describes how to configure routers to use the Cisco Group Management Protocol (CGMP) in switched Ethernet networks to control multicast
More informationConfiguring Port Security
32 CHAPTER This chapter describes how to configure port security on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples. Note For complete syntax and usage information
More informationNetwork Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
More informationUnderstanding Route Aggregation in BGP
Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with
More informationSample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
More informationConfiguring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER
CHAPTER 16 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 16-1 Licensing Requirements
More informationCisco Aironet Wireless Bridges FAQ
Cisco Aironet Wireless Bridges FAQ Document ID: 16041 Contents Introduction What is the Cisco Aironet Wireless Bridge? What are the different platforms of wireless bridges that Cisco offers? Where can
More informationConfigure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure
More informationCisco SNMP FAQs for Cable Networks
Table of Contents SNMP FAQs for Cable Networks...1 Questions...1 Introduction...1 Q. What documents on CCO are available to help me understand, configure, and troubleshoot Simple Network Management Protocol
More informationTable of Contents. Cisco Mapping Outbound VoIP Calls to Specific Digital Voice Ports
Table of Contents Mapping Outbound VoIP Calls to Specific Digital Voice Ports...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Configure...2 Network Diagram...2
More informationDHCP Server Port-Based Address Allocation
The feature provides port-based address allocation support on the Cisco IOS Dynamic Host Configuration Protocol (DHCP) server for the Ethernet platform. The DHCP server provides address assignment support
More informationConfiguring Simple Network Management Protocol (SNMP)
Configuring Simple Network Management Protocol (SNMP) This chapter describes the Simple Network Management Protocol (SNMP), SNMP Management Information Bases (MIBs), and how to configure SNMP on Cisco
More informationConfiguring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER
CHAPTER 19 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 19-1 Licensing Requirements
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN assignment to Avaya 4600 Series IP Telephones
More informationBGP Best Path Selection Algorithm
BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP
More informationASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example
ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 113336 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
More informationConfiguring Timeout, Retransmission, and Key Values Per RADIUS Server
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key
More informationUse Microsoft Outlook with Cisco Unified CallManager Express
Use Microsoft Outlook with Cisco Unified CallManager Express Document ID: 70983 Contents Introduction Prerequisites Requirements Components Used Network Diagram Conventions Background Installation and
More informationConfiguring Port Security
CHAPTER 62 This chapter describes how to configure the port security feature. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master List, at this URL:
More informationConfiguring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
More informationSNMP -overview. Based on: W.Stallings Data and Computer Communications
SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use
More informationSchool of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,
More informationLink Aggregation Interoperability of the Dell PowerConnect 5316M with Cisco IOS or Cisco CatOS based Switches. By Bruce Holmes
Link Aggregation Interoperability of the Dell PowerConnect 5316M with Cisco IOS or Cisco CatOS based Switches By Bruce Holmes August 2005 Contents Introduction...3 Link Aggregation with Gigabit Ethernet
More informationLab 3.10.2 Use Network Inspector to Observe STP Behavior
Lab 3.10.2 Use Network Inspector to Observe STP Behavior Objective The purpose of this lab is to observe STP behavior with the Network Inspector switch trace feature. Scenario A new switched network has
More informationMicrosoft Windows 2003 DNS Server for Wireless LAN Controller (WLC) Discovery Configuration Example
Microsoft Windows 2003 DNS Server for Wireless LAN Controller (WLC) Discovery Configuration Example Document ID: 107606 Contents Introduction Prerequisites Requirements Components Used Conventions Wireless
More informationSimple Network Management Protocol
Simple Network Management Protocol This document describes how to configure the Simple Network Management Protocol (SNMP). This document consists of these sections: Understanding SNMP, page 1 Configuring
More informationNetworking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
More informationASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example
ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example Document ID: 113110 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background
More informationFlow-Based per Port-Channel Load Balancing
The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.
More informationECView Pro Network Management System. Installation Guide. www.edge-core.com
ECView Pro Network Management System Installation Guide www.edge-core.com INSTALLATION GUIDE ECVIEW PRO NETWORK MANAGEMENT SYSTEM SNMP-Based Network Management Software for Windows SW6102 E102010-CS-R01
More informationImplementing Object Tracking on Cisco IOS XR Software
Implementing Object Tracking on Cisco IOS XR Software This module describes the configuration of object tracking on your Cisco IOS XR network. For information about its application in IPSec, see Cisco
More informationSimple Network Management Protocol (SNMP) Causes High C
Simple Network Management Protocol (SNMP) Causes High C Table of Contents IP Simple Network Management Protocol (SNMP) Causes High CPU Utilization...1 Introduction...1 Before You Begin...1 Conventions...1
More informationMAC Address Management
D MAC Address Management Contents Overview..................................................... D-2 Determining MAC Addresses in the Switch........................ D-2 Menu: Viewing the Switch s MAC Addresses....................
More informationVOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide
VOIP-211RS/210RS/220RS/440S SIP VoIP Router User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has
More informationTable of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
More informationHow To Balance On A Cisco Catalyst Switch With The Etherchannel On A Fast Ipv2 (Powerline) On A Microsoft Ipv1 (Powergen) On An Ipv3 (Powergadget) On Ipv4
Cisco - Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switch...Page 1 of 10 Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switches Document ID: 12023 Contents
More informationDatabase Replication Error in Cisco Unified Communication Manager
Database Replication Error in Cisco Unified Communication Manager Document ID: 100781 Contents Introduction Prerequisites Requirements Components Used Conventions Use Unifed Reports to Debug Replication
More informationIP Accounting C H A P T E R
C H A P T E R 6 IP Accounting This chapter describes the IP Accounting features in Cisco IOS and enables you to distinguish the different IP Accounting functions and understand SNMP MIB details. This chapter
More informationHow Are PowerConnect ACLs Different From Cisco ACLs?
PowerConnect Application Note #10 January 2004 How Are PowerConnect ACLs Different From Cisco ACLs? This Application Notes relates to the following Dell PowerConnect products: PowerConnect 33xx Abstract
More informationTransferring Files Using HTTP or HTTPS
Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device
More informationThis section describes how to set up, find and delete community strings.
SNMP V1/V2c setup SNMP community strings, page 1 SNMP notification destinations, page 4 SNMP community strings Set up community string This section describes how to set up, find and delete community strings.
More informationCisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
More informationNetFlow Configuration Guide, Cisco IOS Release 12.2SR
NetFlow Configuration Guide, Cisco IOS Release 12.2SR Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)
More informationAn Overview of SNMP on the IMG
An Overview of SNMP on the IMG Description SNMP The SNMP provides a way to control and monitor a variety of equipment using one network management protocol. To do this, SNMP uses a number of common Management
More informationSampled NetFlow. Feature Overview. Benefits
Sampled NetFlow This feature module describes the Sampled NetFlow feature. It includes information on the benefits of the new feature, supported platforms, supported standards, and the commands necessary
More informationSupported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access
Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server
More informationAT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes
AT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes Please read this document before you begin to use the management software. Supported Platforms The following
More informationPIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example
PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 70031 Contents Introduction Prerequisites Requirements Components Used Conventions Related Products
More information"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
More informationPIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example
PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example Document ID: 82018 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background Information
More informationInterconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led
Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led Course Description The Interconnecting Cisco Networking Devices, Part 2 (ICND2) v2.0 course provides entry-level
More informationConfiguration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
More informationIP Routing Between VLANs
hp procurve 10/100-T xl module J4820A hp procurve 10/100-T xl module J4820A hp procurve Mini-GBIC xl mo d ule J4878A module IP Routing Between VLANs This example configuration provides IP routing between
More informationManaging vlan.dat in Cisco Catalyst Switches Running Cisco IOS Software
Managing vlan.dat in Cisco Catalyst Switches Running Cisco IOS Software Document ID: 109304 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Background Information
More informationDocument ID: 45741. Introduction
Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: 45741 Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4
More information