Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Code Block
languagetext
Router        # Conf t
Router(config)# username {Enter User Here} privilege 5 Password  {Type Password}
Router(config)# privilege exec level 5 show platform software mount
Router(config)# privilege exec level 5 show dial-peer voice summary
Router(config)# privilege exec level 5 show version

...

Code Block
languagetext
Router        # Conf t
Router(config)# snmp-server community {Enter SNMP Value here} RO
Router(Config)# snmp-server location <location> #This command is optional and may needed only if you want to specify the location.
Router(Config)# snmp-server contact <contact info> #This command is optional

Configure the VSM probe as the SNMP Host

Code Block
languagetext
Router (Config)# snmp-server host {Enter VSM Probe IP Address here} 
[traps | informs] version  2c  community-string  [udp-port port-number] [notification-type]
Router(Config)#exit


Use the following commands to verify SNMP V2 Configuration 

Code Block
languagetext
Router # Show snmp community  << This will display configured community string
Router # show snmp host       << This should display the configured SNMP host which should match the configured one

The following example demonstrates a sample configuration of SNMP Version 2 with option to enable all traps

Code Block
languagetext
Router        # Conf t
Router(Config)# snmp-server community VirsaeVSM RO
Router(Config)# snmp-server location BHIVE Auckland
Router(Config)# snmp-server contact Virsae Support Team
Router(Config)# snmp-server host 10.10.10.20 version 2c VirsaeVSM
Router(Config)# snmp-server enable traps
Router (Config) # Exit


Verification output :

Code Block
languagetext
Router    # Show snmp Community
Community name: VirsaeVSM
Community Index: VirsaeVSM
Community SecurityName: VirsaeVSM
storage-type: nonvolatile        active

Router # Show snmp host
Notification host: 10.10.10.20        udp-port: 162   type: trap  user: VirsaeVSM       security model: v2c


The following example demonstrates a sample configuration of SNMP Version 2 with option to enable some traps

Code Block
languagetext
Router        # Conf t
Router(Config)# snmp-server community VirsaeVSM RO
Router(Config)# snmp-server location BHIVE Auckland
Router(Config)# snmp-server contact Virsae Support Team
Router(Config)# snmp-server host 10.10.10.20 version 2c VirsaeVSM
Router(Config)# snmp-server enable traps snmp authentication linkdown linkup coldstart
Router(Config)# snmp-server enable traps cpu threshold
Router(Config)# snmp-server enable traps ipsla
Router(Config)# snmp-server enable traps config-copy
Router(Config)# snmp-server enable traps license
Router(Config)# snmp-server enable traps envmon
Router(Config)# snmp-server enable traps bgp

SNMP Version 3 option

Configure the SNMP V3 using the following commands:

Code Block
languagetext
Router        #  Conf t
Router(config)# snmp-server view {Enter View Name Here}
Router(Config)# snmp-server group <Group Name> v3 [priv|auth|noauth] read <View Name >
Router(Config)# snmp-server user <username> <Group Name> v3 [encrypted] [auth {md5 | sha} auth-password]}
Router(Config)# snmp-server host <Enter VSM Probe IP Address here> version 3 [auth|no auth|priv] <Enter user name here>
Router(Config)# exit


Use the following commands to verify SNMP V3 Configuration 

Code Block
languagetext
Router # Show snmp user  << This will display configured snmp V3 user
Router # show snmp host       << This should display the configured SNMP host which should match the configured one

The following  demonstrates a sample configuration of SNMP Version 3 with Parameters shown in the following table with option to enable all traps with Authentication and Privacy

ParameterValue
View Namevirsaelab
Group NameVSMMonitor
UsernameVSMUser
Authentication PasswordP@ssword123
Privacy PasswordP@ssword123

...

Code Block
languagetext
Router(Config)# snmp-server view virsaelab iso included
Router(Config)# snmp-server group VSMMonitor v3 priv read virsaelab
Router(Config)# snmp-server user VSMUser VSMMonitor v3 auth sha P@ssword123 priv aes 256 P@ssword123
Router(Config)# snmp-server host 192.168.5.180 version 3 authpriv VSMUser
Router(Config)# snmp-server enable traps
Router(Config)# snmp authentication linkdown linkup coldstart
Router(Config)# snmp-server enable traps cpu threshold
Exit

 Verification output :

Code Block
languagetext
Router    # Show snmp user
User name: VSMUser
Engine ID: 800000090300005056BA6363
storage-type: nonvolatile        active
Authentication Protocol: SHA
Privacy Protocol: AES256
Group-name: VSMMonitor


Router # Show snmp host
Notification host: 192.168.5.180  udp-port: 162   type: trap user: VSMUser     security model: v3 priv

The following  demonstrates a sample configuration of SNMP Version 3 with Parameters shown in the following table with option to enable  traps with Authentication Only

ParameterValue
View Namevirsaelab
Group NameVSMMonitor
UsernameVSMUser
Authentication PasswordP@ssword123


Code Block
languagetext
Router(Config)# snmp-server view enablevirsaelab trapsiso ipslaincluded
Router(Config)# snmp-server enable traps config-copy group VSMMonitor v3 auth read virsaelab
Router(Config)# snmp-server enable traps license user VSMUser VSMMonitor v3 auth sha P@ssword123 
Router(Config)# snmp-server enable traps envmon host 192.168.5.180 version 3 auth VSMUser
Router(Config)# snmp-server enable traps bgp
Router(Config)# Exit

CUBE Syslog Configuration

...

Code Block
languagetext
Router(Config)# logging host (Enter VSM Prob IP Address) 
Router(Config)# logging traps (i.e 0 1 2 3 4 5 .. according to your requirement)


Once complete you can move onto the VSM Web Portal Configuration

Web Portal Configuration

Add CUBE

...

FieldSetting

Vendor

Cisco Systems

Product

Unified Border Element

Equipment Name

Friendly name for this CUBE

Username

Administrative Username

Password

Administrative Password

IP Address / Host Name

IP Address of server (Virtual in duplicated servers)

Site

Free text field, this information will be included in alarm notifications from the VSM Workflow.


Image RemovedImage Added

Info

Site ID information in the ‘Site’ field will advise your NOC staff of the site where the Microsoft Server (i.e. the VSM Collector) is physically located.

This is particularly helpful when the customer has multiple sites.

...