[問答] Alcatel router snmp設定

看板Network作者 (小馬怪)時間4年前 (2019/09/02 14:05), 4年前編輯推噓1(1028)
留言29則, 4人參與, 4年前最新討論串1/1
大家好: 不知有沒有人懂Alcatel 6850-24xs snmp設定,我已經試過論壇的設定 但都沒辦法成功,希望能有人協助 謝謝 -- ※ 發信站: 批踢踢實業坊(ptt.cc), 來自: 36.239.77.75 (臺灣) ※ 文章網址: https://www.ptt.cc/bbs/Network/M.1567404304.A.D1D.html

09/03 01:28, 4年前 , 1F
他是 Switch
09/03 01:28, 1F

09/03 03:12, 4年前 , 2F
v1還v3?
09/03 03:12, 2F

09/03 21:11, 4年前 , 3F
參考這篇設定
09/03 21:11, 3F

09/03 21:11, 4年前 , 4F

09/03 21:11, 4年前 , 5F
=8074
09/03 21:11, 5F

09/07 22:22, 4年前 , 6F
他應該是L3的switch 我用v2
09/07 22:22, 6F

09/07 22:23, 4年前 , 7F
我有照s大的那篇文設定 但還是不行..
09/07 22:23, 7F

09/07 22:23, 4年前 , 8F
我是用centos去測試
09/07 22:23, 8F

09/08 20:33, 4年前 , 9F
加入這個試試看
09/08 20:33, 9F

09/08 20:33, 4年前 , 10F
snmp station centos_ip 162 "snmpuser" v2 enable
09/08 20:33, 10F
aaa authentication snmp local user mayyola password mayyola read-only all no auth snmp security no security snmp community map mode enable snmp community map public user mayyola on snmp station x.x.166.187 162 "mayyola" v2 enable snmp trap absorption enable snmp trap to webview enable write memory copy working certified ->show configuration snapshot snmp snmp security no security snmp community map "public" user "mayyola" on snmp station x.x.166.187 162 "mayyola" v2 enable ->show user User name = mayyola, Password expiration = None, Read Only for domains = All , Read/Write for domains = None, Snmp allowed = YES, Snmp authentication = NONE, Snmp encryption = NONE 我在我的win10跑指令也是不行 C:\Users\user\Desktop\SnmpWalk\SnmpWalk.exe -r:x.x.166.254 -p:162 -v:2 -c:public ※ 編輯: gmotwm2001 (36.239.73.205 臺灣), 09/08/2019 21:10:14

09/08 21:26, 4年前 , 11F
把整個snapshot 貼出來看看
09/08 21:26, 11F
!========================================! ! File: snapshot1080908 ! !========================================! ! Chassis : system name vxTarget system timezone +08:00 ! Configuration: ! VLAN : vlan 1 enable name "VLAN 1" vlan 156 enable name "VLAN 156" vlan 156 port default 1/1 vlan 156 port default 1/2 vlan 156 port default 1/3 vlan 156 port default 1/4 vlan 156 port default 1/5 vlan 156 port default 1/6 vlan 156 port default 1/7 vlan 156 port default 1/8 vlan 156 port default 1/9 vlan 156 port default 1/10 vlan 156 port default 1/11 vlan 156 port default 1/12 vlan 156 port default 1/13 vlan 156 port default 1/14 vlan 156 port default 1/15 vlan 156 port default 1/16 vlan 156 port default 1/17 vlan 156 port default 1/18 vlan 156 port default 1/19 vlan 156 port default 1/20 vlan 156 port default 1/21 vlan 156 port default 1/22 vlan 156 port default 1/23 vlan 156 port default 1/24 ! VLAN SL: ! IP : ip dos trap disable ip service ftp ip service ssh ip service telnet no ip service udp-relay ip service http ip service network-time ip service snmp no ip service avlan-telnet no ip service avlan-http no ip service avlan-secure-http ip service secure-http no ip service avlan-http-proxy icmp unreachable net-unreachable disable ip interface "1" address 10.1.156.253 mask 255.255.255.252 vlan 156 ifindex 1 ip interface "156" address 192.168.156.254 mask 255.255.255.0 vlan 156 ifindex 2 ip interface "164" address 192.168.164.254 mask 255.255.255.0 vlan 156 ifindex 3 ip interface "165" address 192.168.165.254 mask 255.255.255.0 vlan 156 ifindex 4 ip interface "166" address 192.168.166.254 mask 255.255.255.0 vlan 156 ifindex 5 ip interface "167" address 192.168.167.254 mask 255.255.255.0 vlan 156 ifindex 6 ip interface "157" address 192.168.157.254 mask 255.255.255.0 vlan 156 ifindex 7 ip interface "Loopback0" address 192.168.100.1 admin disable ! IPX : ! IPMS : ! AAA : aaa authentication default "local" aaa authentication console "local" aaa authentication telnet "local" aaa authentication ftp "local" aaa authentication http "local" aaa authentication snmp "local" aaa authentication ssh "local" aaa accounting session "local" ! PARTM : end-user profile "ReadOnlyProfile" read-only physical vlan-table basic-ip-routing ip-routes-table mac-filtering-table spantree ! AVLAN : ! 802.1x : ! QOS : policy service ftp protocol 6 destination tcp port 21 policy service http protocol 6 destination tcp port 80 policy service https protocol 6 destination tcp port 443 policy service jetdirect protocol 6 destination tcp port 9100 policy service prt protocol 6 destination tcp port 515 policy service rdp protocol 6 destination tcp port 3389 policy service rpcbind protocol 6 destination tcp port 111 policy service snmp protocol 6 destination tcp port 161 policy service ssh protocol 6 destination tcp port 22 policy service telnet protocol 6 destination tcp port 23 policy service group AccessProtocol ftp http https rdp rpcbind policy service group AccessProtocol snmp ssh telnet policy service group PRTProtocol ftp http jetdirect prt policy network group CCwangser 192.168.164.229 policy network group EENet 192.168.128.1 mask 255.255.192.0 policy network group Hongprt 192.168.156.173 policy network group Hub 192.168.157.225 mask 255.255.255.224 policy network group Management 192.168.166.1 mask 255.255.255.0 192.168.165.1 mask 255.255.255.240 policy network group Mgccwangser 192.168.58.1 mask 255.255.255.0 192.168.157.120 mask 255.255.255.128 192.168.167.231 mask 255.255.255.224 policy network group NSYSUNet 192.168.1.1 mask 255.255.0.0 policy network group PRTNet 192.168.166.31 192.168.166.240 policy mac group QuarantineMAC 00:1D:7D:03:E6:65 00:24:1D:8A:52:13 08:62:66:A0:7B:5E 0C:9D:92:5B:EE:6F 10:7B:EF:D0:EA:97 policy mac group QuarantineMAC 14:CC:20:E1:8D:64 50:E5:49:59:6A:D6 52:13:45:78:52:14 54:04:A6:F3:9B:E6 60:A4:4C:23:7A:84 policy mac group QuarantineMAC 6C:AE:8B:1D:85:CA 78:24:AF:33:93:75 78:24:AF:33:93:86 90:8D:78:5E:49:8B AC:22:0B:2A:DD:7D policy mac group QuarantineMAC C8:F7:33:26:52:F5 D8:94:03:C1:1F:C9 F0:79:59:37:27:AB policy condition All2PRT destination network group PRTNet policy condition AuthorizedCond source network group Management destination network group Switch service group AccessProtocol policy condition EE2Horngprt source network group EENet destination network group Hongprt policy condition EE2PRT source network group EENet destination network group PRTNet service group PRTProtocol policy condition EXt2Horngprt destination network group Hongprt policy condition Ext2CCwangser destination network group CCwangser policy condition Ext2Hub destination network group Hub service group AccessProtocol policy condition Int2Hub source network group Management destination network group Hub service group AccessProtocol policy condition Mg2CCwangser source network group Mgccwangser destination network group CCwangser policy condition QuanrantineCond source mac group QuarantineMAC policy condition UnauthorizedCond destination network group Switch service group AccessProtocol policy action ACCEPT policy action DROP disposition drop policy rule BlockQuarMac precedence 260 condition QuanrantineCond action DROP log policy rule AllowIn2CCwang precedence 253 condition Mg2CCwangser action ACCEPT log policy rule AllowHorngprt precedence 252 condition EE2Horngprt action ACCEPT log policy rule AllowEE2Prt precedence 251 condition EE2PRT action ACCEPT policy rule AllowAuthorized precedence 250 condition AuthorizedCond action ACCEPT log policy rule AllowInt2Hub precedence 249 condition Int2Hub action ACCEPT policy rule DenyAll2Prt precedence 201 condition All2PRT action DROP policy rule BlockUnauthorized precedence 200 condition UnauthorizedCond action DROP log policy rule BlockExt2Hub precedence 199 condition Ext2Hub action DROP policy rule DenyInt2Horngprt precedence 198 condition EXt2Horngprt action DROP log policy rule DenyInt2CCwang precedence 197 condition Ext2CCwangser action DROP log qos port 1/4 no trusted maximum bandwidth 10.2M qos port 1/7 no trusted maximum bandwidth 10.2M qos port 1/9 no trusted maximum bandwidth 20.5M qos port 1/10 no trusted maximum bandwidth 80.0M qos port 1/17 no trusted maximum bandwidth 20.5M qos port 1/18 no trusted maximum bandwidth 10.2M qos port 1/20 no trusted maximum bandwidth 10.2M qos apply ! Policy manager : ! Session manager : session timeout cli 10 session timeout http 10 ! SNMP : snmp security no security snmp community map "communityee" user "snmpv2usr" on snmp community map "public" user "mayyola" on snmp station 192.168.166.206 162 "snmpv2usr" v2 enable snmp station 192.168.166.146 162 "snmpv2usr" v2 enable snmp station 192.168.166.187 162 "mayyola" v2 enable snmp trap filter 192.168.166.206 0 1 2 3 4 5 snmp trap filter 192.168.166.206 6 7 8 9 10 11 snmp trap filter 192.168.166.206 12 13 14 15 16 17 snmp trap filter 192.168.166.206 18 19 41 snmp trap filter 192.168.166.146 0 1 2 3 4 5 snmp trap filter 192.168.166.146 6 7 8 9 10 11 snmp trap filter 192.168.166.146 12 15 16 17 18 19 ! RIP : ! OSPF : ip load ospf ip ospf area 0.0.0.156 ip ospf area 0.0.0.156 type nssa ip ospf interface "1" ip ospf interface "1" area 0.0.0.156 ip ospf interface "1" type point-to-point ip ospf interface "1" status enable ip ospf neighbor 10.1.156.254 eligible ip ospf status enable ! ISIS : ! BGP : ! IP multicast : ! IPv6 : ip router router-id 10.1.156.253 ip route-map ospf1 sequence-number 10 action permit ip route-map ospf1 sequence-number 10 match ip-address 0.0.0.0/0 redist-control all-subnets permit ip route-map ospf1 sequence-number 50 action permit ip redist local into ospf route-map ospf1 status enable ip redist static into ospf route-map ospf1 status enable ! RIPng : ! OSPF3 : ! Health monitor : ! Interface : interfaces 1/11 flood rate 496 ! Port Mapping : ! Link Aggregate : ! VLAN AGG: ! 802.1Q : vlan 156 802.1q 1/25 "TAG PORT 1/25 VLAN 156" vlan 156 802.1q 1/26 "TAG PORT 1/26 VLAN 156" ! Spanning tree : bridge mode 1x1 ! Bridging : ! Bridging : ! Port mirroring : ! UDP Relay : ! Server load balance : ! System service : swlog appid ALL level alert swlog appid WEB level warning swlog appid FTP level warning swlog output socket 192.168.166.146 swlog output socket 192.168.166.187 no swlog output flash no swlog output console ! SSH : ! VRRP : ! Web : ! AMAP : ! Lan Power : ! NTP : ntp server 220.130.158.71 key 0 version 4 minpoll 6 ntp client enable ! RDP : ! Ethernet-OAM : ! VLAN STACKING: ※ 編輯: gmotwm2001 (36.239.73.205 臺灣), 09/08/2019 21:41:32

09/08 21:41, 4年前 , 12F
另外提醒 snmpwalk -v:2c 才對喔
09/08 21:41, 12F

09/08 21:42, 4年前 , 13F
s大您好:我有打v2c但還是不行QQ
09/08 21:42, 13F

09/08 21:48, 4年前 , 14F
問題出在qos設定, snmp 161是走udp, 你設定的是tcp,
09/08 21:48, 14F

09/08 21:48, 4年前 , 15F
所以被qos policy drop掉了
09/08 21:48, 15F

09/08 21:51, 4年前 , 16F
你要測試可以先下
09/08 21:51, 16F

09/08 21:51, 4年前 , 17F
qos disable
09/08 21:51, 17F

09/08 21:51, 4年前 , 18F
qos apply
09/08 21:51, 18F

09/08 21:51, 4年前 , 19F
再跑看看snmpwalk
09/08 21:51, 19F

09/08 23:44, 4年前 , 20F
我有把qos rule inactive,還是不行
09/08 23:44, 20F

09/08 23:45, 4年前 , 21F
然後我剛剛在rule 都active 時,修改service 中的snmp
09/08 23:45, 21F

09/08 23:45, 4年前 , 22F
為161 udp
09/08 23:45, 22F

09/08 23:47, 4年前 , 23F

09/08 23:48, 4年前 , 24F
結果整個rule都失效(嚇死我),這是不是要先將rule
09/08 23:48, 24F

09/08 23:48, 4年前 , 25F
跟condition 刪掉,才可以改service
09/08 23:48, 25F

09/08 23:49, 4年前 , 26F
的值,然後再重新加condition 跟rule
09/08 23:49, 26F

09/08 23:53, 4年前 , 27F
qos disable也不行? qos policy如果要修改,必須把
09/08 23:53, 27F

09/08 23:55, 4年前 , 28F
套用的都刪掉才能改
09/08 23:55, 28F

09/09 00:07, 4年前 , 29F
建議你先把qos disable掉來確認是否是qos問題造成
09/09 00:07, 29F
文章代碼(AID): #1TRB4GqT (Network)