...
Code Block | ||
---|---|---|
| ||
Router # Conf t
Router(config)# username {Enter User Here} privilege 5 Password {Type Password}
Router(config)# privilege exec level 5 show platform software mount
Router(config)# privilege exec level 5 show dial-peer voice summary
Router(config)# privilege exec level 5 show version
|
...
Code Block | ||
---|---|---|
| ||
Router # Conf t
Router(config)# snmp-server community {Enter SNMP Value here} RO
Router(Config)# snmp-server location <location> #This command is optional and may needed only if you want to specify the location.
Router(Config)# snmp-server contact <contact info> #This command is optional
|
Configure the VSM probe as the SNMP Host
Code Block | ||
---|---|---|
| ||
Router (Config)# snmp-server host {Enter VSM Probe IP Address here} [traps | informs] version 2c community-string [udp-port port-number] [notification-type] Router(Config)#exit |
Use the following commands to verify SNMP V2 Configuration
Code Block | ||
---|---|---|
| ||
Router # Show snmp community << This will display configured community string
Router # show snmp host << This should display the configured SNMP host which should match the configured one |
The following example demonstrates a sample configuration of SNMP Version 2 with option to enable all traps
Code Block | ||
---|---|---|
| ||
Router # Conf t Router(Config)# snmp-server community VirsaeVSM RO Router(Config)# snmp-server location BHIVE Auckland Router(Config)# snmp-server contact Virsae Support Team Router(Config)# snmp-server host 10.10.10.20 version 2c VirsaeVSM Router(Config)# snmp-server enable traps Router (Config) # Exit |
Verification output :
Code Block | ||
---|---|---|
| ||
Router # Show snmp Community
Community name: VirsaeVSM
Community Index: VirsaeVSM
Community SecurityName: VirsaeVSM
storage-type: nonvolatile active
Router # Show snmp host
Notification host: 10.10.10.20 udp-port: 162 type: trap user: VirsaeVSM security model: v2c |
The following example demonstrates a sample configuration of SNMP Version 2 with option to enable some traps
Code Block | ||
---|---|---|
| ||
Router # Conf t
Router(Config)# snmp-server community VirsaeVSM RO
Router(Config)# snmp-server location BHIVE Auckland
Router(Config)# snmp-server contact Virsae Support Team
Router(Config)# snmp-server host 10.10.10.20 version 2c VirsaeVSM
Router(Config)# snmp-server enable traps snmp authentication linkdown linkup coldstart
Router(Config)# snmp-server enable traps cpu threshold
Router(Config)# snmp-server enable traps ipsla
Router(Config)# snmp-server enable traps config-copy
Router(Config)# snmp-server enable traps license
Router(Config)# snmp-server enable traps envmon
Router(Config)# snmp-server enable traps bgp |
SNMP Version 3 option
Configure the SNMP V3 using the following commands:
Code Block | ||
---|---|---|
| ||
Router # Conf t Router(config)# snmp-server view {Enter View Name Here} Router(Config)# snmp-server group <Group Name> v3 [priv|auth|noauth] read <View Name > Router(Config)# snmp-server user <username> <Group Name> v3 [encrypted] [auth {md5 | sha} auth-password]} Router(Config)# snmp-server host <Enter VSM Probe IP Address here> version 3 [auth|no auth|priv] <Enter user name here> Router(Config)# exit |
Use the following commands to verify SNMP V3 Configuration
Code Block | ||
---|---|---|
| ||
Router # Show snmp user << This will display configured snmp V3 user
Router # show snmp host << This should display the configured SNMP host which should match the configured one |
The following demonstrates a sample configuration of SNMP Version 3 with Parameters shown in the following table with option to enable all traps with Authentication and Privacy
Parameter | Value |
---|---|
View Name | virsaelab |
Group Name | VSMMonitor |
Username | VSMUser |
Authentication Password | P@ssword123 |
Privacy Password | P@ssword123 |
...
Code Block | ||
---|---|---|
| ||
Router(Config)# snmp-server view virsaelab iso included Router(Config)# snmp-server group VSMMonitor v3 priv read virsaelab Router(Config)# snmp-server user VSMUser VSMMonitor v3 auth sha P@ssword123 priv aes 256 P@ssword123 Router(Config)# snmp-server host 192.168.5.180 version 3 authpriv VSMUser Router(Config)# snmp-server enable traps Router(Config)# snmp authentication linkdown linkup coldstart Router(Config)# snmp-server enable traps cpu threshold Exit |
Verification output :
Code Block | ||
---|---|---|
| ||
Router # Show snmp user
User name: VSMUser
Engine ID: 800000090300005056BA6363
storage-type: nonvolatile active
Authentication Protocol: SHA
Privacy Protocol: AES256
Group-name: VSMMonitor
Router # Show snmp host
Notification host: 192.168.5.180 udp-port: 162 type: trap user: VSMUser security model: v3 priv
|
The following demonstrates a sample configuration of SNMP Version 3 with Parameters shown in the following table with option to enable traps with Authentication Only
Parameter | Value |
---|---|
View Name | virsaelab |
Group Name | VSMMonitor |
Username | VSMUser |
Authentication Password | P@ssword123 |
Code Block | ||
---|---|---|
| ||
Router(Config)# snmp-server view enablevirsaelab trapsiso ipslaincluded Router(Config)# snmp-server enable traps config-copy group VSMMonitor v3 auth read virsaelab Router(Config)# snmp-server enable traps license user VSMUser VSMMonitor v3 auth sha P@ssword123 Router(Config)# snmp-server enable traps envmon host 192.168.5.180 version 3 auth VSMUser Router(Config)# snmp-server enable traps bgp Router(Config)# Exit |
CUBE Syslog Configuration
...
Code Block | ||
---|---|---|
| ||
Router(Config)# logging host (Enter VSM Prob IP Address) Router(Config)# logging traps (i.e 0 1 2 3 4 5 .. according to your requirement) |
Once complete you can move onto the VSM Web Portal Configuration
Web Portal Configuration
Add CUBE
...
Field | Setting |
---|---|
Vendor | Cisco Systems |
Product | Unified Border Element |
Equipment Name | Friendly name for this CUBE |
Username | Administrative Username |
Password | Administrative Password |
IP Address / Host Name | IP Address of server (Virtual in duplicated servers) |
Site | Free text field, this information will be included in alarm notifications from the VSM Workflow. |
Info |
---|
Site ID information in the ‘Site’ field will advise your NOC staff of the site where the Microsoft Server (i.e. the VSM Collector) is physically located. This is particularly helpful when the customer has multiple sites. |
...