This section describes the SNMP traps used on the switch.
The switch supports a number of traps that indicate alarm or condition changes on the device. This section will list out those traps and describe how they are generated.
The following is applicable for all traps.
iS5Comm# configure terminal
iS5Comm(config)# enable SnmpAgent
iS5Comm(config)# snmp user snmpv3 auth md5 AUTHPASSWD
iS5Comm(config)# snmp community index index3 name testv3 security snmpv3
iS5Comm(config)# snmp group testv3 user snmpv3 security-model v3 nonvolatile
iS5Comm(config)# snmp access testv3 v3 auth read iso write iso notify iso
iS5Comm(config)# snmp targetaddr ht8 param pa8 5.0.0.5 taglist tg8
iS5Comm(config)# snmp targetparams pa8 user snmpv3 security-model v3 auth message-processing v3
iS5Comm(config)# snmp notify testv3 tag tg8 type Trap
Commands to enable the alarm traps
iS5Comm(config)# alarm config-type switch relay enable
iS5Comm(config)# alarm config-type switch LED enable
iS5Comm(config)# alarm config-type chassis relay enable
iS5Comm(config)# alarm config-type chassis LED enable
iS5Comm(config)# alarm config-type protocol relay enable
iS5Comm(config)# alarm config-type protocol LED enable
iS5Comm(config)# alarm config-type service relay enable
iS5Comm(config)# alarm config-type service LED enable
Commands to enable the authentication failure trap
iS5Comm(config)# snmp engineId 80.00.08.1c.04.46.54
iS5Comm(config)# snmp user proxyuser1
iS5Comm(config)# snmp group proxygroup user proxyuser1 security-model v2c
iS5Comm(config)# snmp access proxygroup v2c read getview write getview
iS5Comm(config)# snmp view getview 1 mask 1 included volatile
iS5Comm(config)# snmp community index COMM2 name COMM2 security proxyuser1 contextengineid 80.00.08.1c.04.46.54
iS5Comm(config)# exit
iS5Comm#
IP address 5.0.0.5, as used above, is the IP through which the SNMP manager could be reached. This IP address is being used as an example only.
A line module TRAP will be generated, whenever a line module is inserted or removed. Below are the corresponding MIB IDs that would be mentioned in the generated TRAP.
The Warm Start TRAP will be generated, when “reload” command is issued. Below is the corresponding MIB ID that would be mentioned, with the TRAP generated.
Packet Capture
The Power supply TRAP will be generated, whenever a Power module is inserted or removed.Below are the corresponding MIB IDs that would be mentioned, with the TRAP generated.
The Cold Start TRAP will be generated, whenever the image is reloaded after doing SNMP configurations for TRAP and “write-startup” is done. Below is the corresponding MIB ID that would be mentioned, with the TRAP generated.
Packet Capture
An Authentication failure TRAP will be generated, whenever the SNMP connectivity cannot be established due to Authentication failures. Below is the corresponding MIB ID that would be mentioned, with the TRAP generated.
snmp-server enable traps snmp authentication
snmpwalk -c COMM1 -v2c 7.0.0.1 iso
Here the community name configured is COMM2, but from LINUX, we are trying to authenticate with COMM1, which would cause a authentication failure.
A LINK UP / LINK DOWN TRAP will be generated, whenever any interface is brought UP or DOWN. Below is the corresponding MIB ID that would be mentioned, with the TRAP generated.
The Spanning tree topology change trap is generated whenever we shut / no shut a port, change the priority of any bridge to invoke new root selection, new port role selection, etc.
Packet Capture
Below are the MIBs that will be mentioned for different kind of traps from PVRST.
Item #1
Item #2
Item #3
Item #4
Item #5
set switch temperature max threshold <value>
Packet Capture
Item #1
Item #2
Item #3
Item #4
Item #5
Item #1
Item #2
Item #3
Item #4
Item #5
Item #6
Item #7
Item #8