This section provides an example to describe how to configure a device to communicate with an NMS by using SNMPv3 and how to specify the MIB objects that can be managed by the NMS.
As shown in Figure 1, two NMSs (NMS1 and NMS2) and the router are connected across a public network. According to the network planning, NMS2 can manage every MIB object on the router, and NMS1 does not manage the router.
On the router, only the modules that are enabled by default are allowed to send alarms to NMS2. This prevents an excess of unwanted alarms from being sent to NMS2. Excessive alarms make fault location difficult.
The data transmitted between NMS2 and the router needs to be encrypted and the NMS administrator needs to be authenticated because the data has to travel across the public network.
Contact information of the device administrator needs to be configured on the router. This helps the NMS administrator contact the device administrator if a fault occurs.
Interface 1 in this example represents GE 0/1/0.
The configuration roadmap is as follows:
Enable the SNMP agent.
Configure the router to run SNMPv3.
Configure an ACL to allow NMS2 to manage every MIB object on the router and configure data encryption.
Configure the trap function to allow the router to send alarms to NMS2.
Configure the contact information of the device administrator.
Configure NMS2.
To complete the configuration, you need the following data:
SNMP version
User group name
User name and password
Authentication and privacy algorithms
ACL number
IP address of the NMS
Contact information of the device administrator
<HUAWEI> system-view [~HUAWEI] sysname DeviceA [*HUAWEI] snmp-agent password min-length 10 [*HUAWEI] snmp-agent [*HUAWEI] commit
[~DeviceA] snmp-agent sys-info version v3 [*DeviceA] commit
# Check the configured SNMP version.
[~DeviceA] display snmp-agent sys-info version SNMP version running in the system: SNMPv3
[~DeviceA] snmp-agent protocol source-interface Loopback0 [*DeviceA] commit
[~DeviceA] acl 2001 [*DeviceA-acl4-basic-2001] rule 5 permit source 1.1.1.2 0.0.0.0 [*DeviceA-acl4-basic-2001] rule 6 deny source 1.1.1.1 0.0.0.0 [*DeviceA-acl4-basic-2001] commit [~DeviceA-acl4-basic-2001] quit
# Configure a MIB view.
[~DeviceA] snmp-agent mib-view included iso iso [*DeviceA] commit
# Configure a user group and a user in this group and enable user data authentication and encryption.
[~DeviceA] snmp-agent group v3 admin privacy write-view iso notify-view iso read-view iso [*DeviceA] snmp-agent usm-user v3 nms2-admin group admin acl 2001 [*DeviceA] snmp-agent usm-user v3 nms2-admin authentication-mode sha2-224 Please configure the authentication password (10-255) Enter Password: Confirm Password: [*DeviceA] snmp-agent usm-user v3 nms2-admin privacy-mode aes128 Please configure the privacy password (10-255) Enter Password: Confirm Password [*DeviceA] commit
[~DeviceA] snmp-agent target-host trap address udp-domain 1.1.1.2 params securityname nms2-admin v3 privacy [*DeviceA] snmp-agent trap enable [*DeviceA] commit
[~DeviceA] snmp-agent sys-info contact call Operator at 010-12345678 [*DeviceA] commit
For details on how to configure NMS2, see the relevant NMS configuration guide.
After the configuration is complete, run the following commands to verify that the configuration has taken effect.
# Check the configured SNMP version.
[~DeviceA] display snmp-agent sys-info version SNMP version running in the system: SNMPv3
# Check the user group information.
<DeviceA> display snmp-agent group admin
Group name: admin
Security model: v3
Readview: iso
Writeview: iso
Notifyview: iso
Storage-type: nonVolatile
# Check the user information.
<DeviceA> display snmp-agent usm-user User name: nms2-admin Engine ID: 800007DB0300259E0370C3 active Authentication Protocol: sha Privacy Protocol: aes128 Group name: admin State: Active Acl: 2001
<DeviceA> display acl 2001
Basic ACL 2001, 2 rules
ACL's step is 5
rule 5 permit ip source 1.1.1.1 0 (4 times matched)
rule 6 deny source 1.1.1.1 0 (0 times matched)
# Check the MIB view.
<DeviceA> display snmp-agent mib-view viewname iso
View name: iso
MIB Subtree: iso
Subtree mask: FF80(Hex)
Storage-type: nonVolatile
View Type: included
View status: active
# Check the target host.
<DeviceA> display snmp-agent target-host Target-host NO. 1 --------------------------------------------------------------------------- Host-name : - IP-address : 1.1.1.2 Source interface : - VPN instance : - Security name : nms2-admin Port : 162 Type : trap Version : v3 Level : Privacy NMS type : NMS With ext-vb : No Notification filter profile name : - ---------------------------------------------------------------------------
# Check the contact information of the device administrator.
<DeviceA> display snmp-agent sys-info contact
The contact person for this managed node:
call Operator at 010-12345678
router configuration file
# sysname DeviceA # snmp-agent trap type base-trap # acl number 2001 rule 5 permit source 1.1.1.2 0.0.0.0 rule 6 deny source 1.1.1.1 0.0.0.0 # interface GigabitEthernet0/1/0 undo shutdown ip address 1.1.2.1 255.255.255.0 # interface loopback0 ip address 1.1.3.1 255.255.255.255 # ospf 1 area 0.0.0.0 network 1.1.2.0 0.0.0.255 network 1.1.3.1 0.0.0.0 # snmp-agent snmp-agent password min-length 10 snmp-agent local-engineid 800007DB03360102101100 # snmp-agent protocol source-interface Loopback0 # snmp-agent sys-info contact call Operator at 010-12345678 snmp-agent sys-info version v3 snmp-agent group v3 admin privacy write-view iso notify-view iso read-view iso snmp-agent target-host trap address udp-domain 1.1.1.2 params securityname nms2-admin v3 privacy # snmp-agent mib-view included iso iso snmp-agent usm-user v3 nms2-admin group admin acl 2001 snmp-agent usm-user v3 nms2-admin authentication-mode sha2-224 %#%##/L&Fd]S.!i*S7<\jCh2DkfkE4+:<%Wap|8zZWwPL+[a>h$wy>VJsp9(L{%B%#%# snmp-agent usm-user v3 nms2-admin privacy-mode aes128 %#%#CM-]HDuhH6VX)**J<186nf({M823f(0Z73++7(A#%,1jODj}D>_HS>W,'Ss=%#%# # return