Configuring SNMP & RMON

CHAPTERS

1. SNMP

2. SNMP Configurations

3. Notification Configurations

4. RMON

5. RMON Configurations

6. Configuration Example

7. Appendix: Default Parameters

This guide applies to:

T1500G-8T v2 or above, T1500G-10PS v2 or above, T1500G-10MPS v2 or above, T1500-28PCT v3 or above, T1600G-18TS v2 or above, T1600G-28TS v3 or above, T1600G-28PS v3 or above, T1600G-52TS v3 or above, T1600G-52PS v3 or above, T1700X-16TS v3 or above, T1700G-28TQ v3 or above, T2500G-10TS v2 or above, T2600G-18TS v2 or above, T2600G-28TS v3 or above, T2600G-28MPS v3 or above, T2600G-28SQ v1 or above, T2600G-52TS v3 or above.

1SNMP

1.1Overview

SNMP (Simple Network Management Protocol) is a standard network management protocol, widely used on TCP/IP networks. It facilitates device management using NMS (Network Management System) software. With SNMP, network managers can view or modify network device information, and troubleshoot according to notifications sent by those devices in a timely manner.

As the following figure shows, the SNMP system consists of an SNMP manager, an SNMP agent, and a MIB (Management Information Base). The SNMP manager can be part of an NMS such as tpNMS. The agent and MIB reside on the managed device such as the switch, router, host or printer. To configure SNMP on the switch, you define the relationship between the manager and the agent.

Figure 1-1 SNMP System

1.2Basic Concepts

The following basic concepts of SNMP will be introduced: SNMP manager, SNMP agent, MIB (Management Information Base), SNMP entity, SNMP engine, and SNMP version.

SNMP Manager

The SNMP manager uses SNMP to monitor and control SNMP agents, providing a friendly management interface for the administrator to manage network devices conveniently. It can get an MIB objects values from an agent or store a value of MIB object into the agent. Also, it receives notifications from the agents so as to learn the condition of the network.

SNMP Agent

An SNMP agent is a process running on the managed device. It contains MIB objects whose values can be requested or changed by the SNMP manager. An agent can send unsolicited trap messages to notify the SNMP manager that a significant event has occurred on the agent.

MIB

A MIB is a collection of managed objects that is organized hierarchically. The objects define the attributes of the managed device, including the names, status, access rights, and data types. Each object can be addressed through an object identifier (OID).

As the following figure shows, the MIB hierarchy can be depicted as a tree with a nameless root, the levels of which are assigned by different organizations. The top-level MIB object IDs belong to different standards organizations, while lower-level object IDs are allocated by associated organizations. Vendors can define private branches that include managed objects for their own products.

Figure 1-2 MIB Tree

TP-Link switches provide private MIBs that can be identified by the OID 1.3.6.1.4.1.11863. The MIB file can be found on the provided CD or the download center of our official website:
https://www.tp-link.com/en/download-center.html.

Also, TP-Link switches support the following public MIBs:

LLDP.mib

LLDP-Ext-Dot1.mib

LLDP-Ext-MED.mib

RFC1213.mib

RFC1493-Bridge.mib

RFC1757-RMON.mib

RFC2618-RADIUS-Auth-Client.mib

RFC2620-RADIUS-Acc-Client.mib

RFC2674-pBridge.mib

RFC2674-qBridge.mib

RFC2863-pBridge.mib

RFC2925-Disman-Ping.mib

RFC2925-Disman-Traceroute.mib

For detail information about the supported public MIBs, see Supported Public MIBs for TP-Link Switches which can be found on the training center of our website:
https://www.tp-link.com/en/configuration-guides.html

SNMP Entity

An SNMP entity is a device running the SNMP protocol. Both the SNMP manager and SNMP agent are SNMP entities.

SNMP Engine

An SNMP engine is a part of the SNMP entity. Every SNMP entity has one and only one engine. An SNMP engine provides services for ending and receiving messages, authenticating and encrypting messages, and controlling access to managed objects.

An SNMP engine can be uniquely identified by an engine ID within an administrative domain. Since there is a one-to-one association between SNMP engines and SNMP entities, we can also use the engine ID to uniquely and unambiguously identify the SNMP entity within that administrative domain.

SNMP Version

The device supports three SNMP versions: SNMPv1, SNMPv2c and SNMPv3. Table 1-1 lists features supported by different SNMP versions, and Table 1-2 shows corresponding application scenarios.

Table 1-1Features Supported by Different SNMP Versions

Table 1-2Application Scenarios of Different Versions

2SNMP Configurations

To complete the SNMP configuration, choose an SNMP version according to network requirements and supportability of the NMS software, and then follow these steps:

Choose SNMPv1 or SNMPv2c

1)Enable SNMP.

2)Create an SNMP view for managed objects.

3)Create a community, specify the accessible view and the corresponding access rights.

Choose SNMPv3

1)Enable SNMP.

2)Create an SNMP view for managed objects.

3)Create an SNMP group, and specify the access rights.

4)Create SNMP users, and configure the authentication mode, privacy mode and corresponding passwords.

2.1Using the GUI

2.1.1Enabling SNMP

Choose the MAINTENANCE > SNMP > Global Config to load the following page.

Figure 2-1 Global Config

Follow these steps to configure SNMP globally:

1)In the Global Config section, enable SNMP and configure the local and remote engine ID.

SNMP

Enable or disable SNMP globally.

Local Engine ID

Set the engine ID of the local SNMP agent (the switch) with 10 to 64 hexadecimal digits. By default, the switch generates the engine ID using TP-Link’s enterprise number (80002e5703) and its own MAC address.

The local engine ID is a unique alphanumeric string used to identify the SNMP engine. As an SNMP agent contains only one SNMP engine, the local engine ID can uniquely identify the SNMP agent.

Remote Engine ID

Set the ID of the remote SNMP manager with 10 to 64 hexadecimal digits. If no remote SNMP manager is needed, you can leave this field empty.

The remote engine ID is a unique alphanumeric string. It is used to identify the SNMP engine on the remote device thats receives inform messages from Switch.

2)Click Apply.

Note:

The engine ID must contain an even number of characters.

Changing the value of the SNMP engine ID has important side effects. In SNMPv3, a user’s password is converted to an MD5 or SHA security digest based on the password and the engine ID. If the value of local engine ID changes, the switch will automatically delete all SNMPv3 local users as their security digests become invalid. Similarly, all SNMPv3 remote users will be deleted if the value of remote engine ID changes.

2.1.2Creating an SNMP View

Choose the menu MAINTENANCE > SNMP > Global Config to load the following page.

Figure 2-2 SNMP View Config

NMS manages MIB objects based on the SNMP view. An SNMP view is a subset of a MIB. The system provides a default view named viewDefault, and you can create other SNMP views according to your needs.

Follow these steps to create an SNMP view:

1)Click to load the following page. Enter a view name, and specify the view type and a MIB object that is related to the view.

Figure 2-3 Creating an SNMP View

View Name

Set the view name with 1 to 16 characters. A complete view consists of all MIB objects that have the same view name.

View Type

Set the view to include or exclude the related MIB object. By default, it is include.

Include: The NMS can view or manage the function indicated by the object.

Exclude: The NMS cannot view or manage the function indicated by the object.

MIB Object ID

Enter a MIB Object ID to specify a specific function of the device. When a MIB Object ID is specified, all its child Object IDs are specified. For specific ID rules, refer to the device related MIBs.

2)Click Create.

2.1.3Creating SNMP Communities (For SNMP v1/v2c)

Choose the menu MAINTENANCE > SNMP > SNMP v1/v2c and click to load the following page.

Figure 2-4 Creating an SNMP Community

1)Set the community name, access rights and the related view.

Community Name

Configure the community name. This community name is used like a password to give the NMS access to MIB objects in the switch’s SNMP agent.

Access Mode

Specify the access right to the related view. The default is read-only.

Read Only: The NMS can view but not modify parameters of the specified view.

Read & Write: The NMS can view and modify parameters of the specified view.

MIB View

Choose an SNMP view that allows the community to access. The default view is viewDefault.

2)Click Create.

2.1.4Creating an SNMP Group (For SNMP v3)

Create an SNMP group and configure related parameters.

Choose the menu MAINTENANCE > SNMP > SNMP v3 > SNMP Group and click to load the following page.

Figure 2-5 Creating an SNMP Group

Follow these steps to create an SNMP Group:

1)Assign a name to the group, then set the security level and the read view, write view and notify view.

Group Name

Set the SNMP group name. You may enter 1 to 16 characters.

The identifier of a group consists of a group name, security model and security level. Groups of the same identifier are recognized as being in the same group.

Security Model

Displays the security model. SNMPv3 uses v3, the most secure model.

Security Level

Set the security level which for the SNMPv3 group. The default is NoAuthNoPriv.

NoAuthNoPriv: No authentication mode or privacy mode is applied to check or encrypt packets.

AuthNoPriv: An authentication mode is applied to check packets, but no privacy mode is applied to encrypt them.

AuthPriv: An authentication mode and a privacy mode are applied to check and encrypt packets.

Read View

Choose a view to allow parameters to be viewed but not modified by the NMS. The view is necessary for any group. By default, the view is viewDefault. To modify parameters of a view, you need to add it to Write View.

Write View

Choose a view to allow parameters to be modified but not viewed by the NMS. The default is none. The view in Write View should also be added to Read View.

Notify View

Choose a view to allow it to send notifications to the NMS.

2)Click Create.

2.1.5Creating SNMP Users (For SNMP v3)

Choose the menu MAINTENANCE > SNMP > SNMP v3 > SNMP User and click to load the following page.

Figure 2-6 Creating an SNMP User

Follow these steps to create an SNMP user:

1)Specify the user name, user type and the group which the user belongs to. Then configure the security level.

User Name

Set the SNMP user name. You may use 1 to 16 characters. For different entries, user names cannot be the same.

User Type

Choose a user type to indicate the location of the user. The default is Local User.

Local User: The user resides on the local engine, which is the SNMP agent of the switch.

Remote User: The user resides on the NMS. As the remote engine ID and user password are used to compute the authentication and privacy digests, before configuring a remote user, you need to set the remote engine ID first.

Group Name

Choose the group that the user belongs to. Users with the same Group Name, Security Model and Security Level will be in the same group.

Security Model

Displays the security model. SNMPv3 uses v3, the most secure model.

Security Level

Set the security level. The security level from highest to lowest is: NoAuthNoPriv, AuthNoPriv, AuthPriv, and the default is NoAuthNoPriv. The security level of the user should not be lower than the group it belongs to.

NoAuthNoPriv: Uses a username match for authentication, and no encryption is implemented.

AuthNoPriv: An authentication mode is applied to check packets, but no privacy mode is applied to encrypt them.

AuthPriv: An authentication mode and a privacy mode are applied to check and encrypt packets.

2)If you have chosen AuthNoPriv or AuthPriv as the security level, you need to set corresponding Authentication Mode or Privacy Mode. If not, skip the step.

Authentication Mode

With AuthNoPriv or AuthPriv selected, configure the authentication mode and password. Two authentication modes are provided:

MD5: Enable the HMAC-MD5 algorithm for authentication.

SHA: Enable the SHA (Secure Hash Algorithm) algorithm for authentication. SHA algorithm is securer than MD5 algorithm.

Authentication Password

Set the password for authentication.

Privacy Mode

With AuthPriv selected, configure the privacy mode and password for encryption. The switch uses the DES (Data Encryption Standard) algorithm for encryption.

Privacy Password

Set the password for encryption.

3)Click Create.

2.2Using the CLI

2.2.1Enabling SNMP

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server

Enabling SNMP.

Step 3

snmp-server engineID {[ local local-engineID] [remote remote-engineID]}

Configure the local engine ID and the remote engine ID.

local-engineID: Enter the engine ID of the local SNMP agent (the switch) with 10 to 64 hexadecimal digits. By default, the switch generates the engine ID using TP-Link’s enterprise number (80002e5703) and its own MAC address.

The local engine ID is a unique alphanumeric string used to identify the SNMP engine. As an SNMP agent contains only one SNMP engine, the local engine ID can uniquely identify the SNMP agent.

remote-engineID: Enter the remote engine ID with 10 to 64 hexadecimal digits. The ID must contain an even number of characters. The remote engine ID is a unique alphanumeric string. It is used to identify the SNMP engine on the remote device that receives inform messages from switch.

Note:

Changing the value of the SNMP engine ID has important side effects. In SNMPv3, a user’s password is converted to an MD5 or SHA security digest based on the password and the engine ID. If the value of local engine ID changes, the switch will automatically delete all SNMPv3 local users as their security digests become invalid. Similarly, all SNMPv3 remote users will be deleted if the value of remote engine ID changes.

Step 4

show snmp-server

Displays the global settings of SNMP.

Step 5

show smnp-server engineID

Displays the engine ID of SNMP.

Step 6

end

Return to privileged EXEC mode.

Step 7

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to enable SNMP and set 123456789a as the remote engine ID:

Switch#configure

Switch(config)#snmp-server

Switch(config)#snmp-server engineID remote 123456789a

Switch(config)#show snmp-server

SNMP agent is enabled.

0 SNMP packets input

0 Bad SNMP version errors

0 Unknown community name

0 Illegal operation for community name supplied

0 Encoding errors

0 Number of requested variables

0 Number of altered variables

0 Get-request PDUs

0 Get-next PDUs

0 Set-request PDUs

0 SNMP packets output

0 Too big errors (Maximum packet size 1500)

0 No such name errors

0 Bad value errors

0 General errors

0 Response PDUs

0 Trap PDUs

Switch(config)#show snmp-server engineID

Local engine ID: 80002e5703000aeb13a23d

Remote engine ID: 123456789a

Switch(config)#end

Switch#copy running-config startup-config

2.2.2Creating an SNMP View

Specify the OID (Object Identifier) of the view to determine objects to be managed.

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server view name mib-oid {include | exclude}

Configure the view.

name: Enter a view name with 1 to 16 characters. You can create multiple entries with each associated to a MIB object. A complete view consists of all MIB objects that have the same view name.

mib-oid: Enter the MIB object ID with 1 to 61 characters.

include | exclude: Specify a view type. Include indicates that objects of the view can be managed by the NMS, while exclude indicates that objects of the view cannot be managed by the NMS.

Step 3

show snmp-server view

Displays the view table.

Step 4

end

Return to Privileged EXEC Mode.

Step 5

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to set a view to allow the NMS to manage all function. Name the view as View:

Switch#configure

Switch(config)#snmp-server view View 1 include

Switch(config)#show snmp-server view

No. View Name Type MOID

--- ------------ ------- ----

1 viewDefault include 1

2 viewDefault exclude 1.3.6.1.6.3.15

3 viewDefault exclude 1.3.6.1.6.3.16

4 viewDefault exclude 1.3.6.1.6.3.18

5 View include 1

Switch(config)#end

Switch#copy running-config startup-config

2.2.3Creating SNMP Communities (For SNMP v1/v2c)

For SNMPv1 and SNMPv2c the Community Name is used for authentication, functioning as the password.

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server community name { read-only | read-write } [mib-view]

Configure the community.

name: Enter a group name with 1 to 16 characters.

read-only | read-write: Choose an access permissions for the community. Read-only indicates that the NMS can view but cannot modify parameters of the view, while read-write indicates that the NMS can both view and modify.

mib-view: Enter a view to allow it to be accessed by the community. The name contains 1 to 61 characters. The default view is viewDefault.

Step 3

show snmp-server community

Displays community entries.

Step 4

end

Return to privileged EXEC mode.

Step 5

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to set an SNMP community. Name the community as the nms-monitor, and allow the NMS to view and modify parameters of View:

Switch#configure

Switch(config)#snmp-server community nms-monitor read-write View

Switch(config)#show snmp-server community

Index Name Type MIB-View

----- ---------------- ------------ --------

1 nms-monitor read-write View

Switch(config)#end

Switch#copy running-config startup-config

2.2.4Creating an SNMP Group (For SNMPv3)

Create an SNMP group and set user access control with read, write and notify views. Meanwhile, set the authentication and privacy modes to secure the communication between the NMS and managed devices.

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server group name [ smode v3 ] [ slev {noAuthNoPriv | authNoPriv | authPriv}] [ read read-view ] [ write write-view ] [ notify notify-view ]

Create an SNMP group.

name: Enter the group name with 1 to 16 characters. The identifier of a group consists of a group name, security model and security level. Groups of the same identifier are recognized as being in the same group.

v3: Configure the security mode for the group. v3 indicates SNMPv3, the most secure model.

noAuthNoPriv | authNoPriv | authPriv: Choose a security level among noAuthNoPriv (no authorization and no encryption), authNoPriv (authorization and no encryption), authPriv (authorization and encryption). The default is noAuthNoPriv. Please note that if you have chosen v1 or v2c as the security mode, the security level cannot be configured.

read-view: Set the view to be the Read view. Then the NMS can view parameters of the specified view.

write-view: Set the view to be the Write view. Then the NMS can modify parameters of the specified view. Please note that the view in the Write view should also be in the Read view.

notify-view: Set the view to be the Notify view. Then the NMS can get notifications of the specified view from the agent.

Step 3

show snmp-server group

Displays SNMP group entries.

Step 4

end

Return to Privileged EXEC Mode.

Step 5

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to create an SNMPv3 group with the group name as nms1, the security level as authPriv, and the Read and Notify view are both View1:

Switch#configure

Switch(config)#snmp-server group nms1 smode v3 slev authPriv read View1 notify View1

Switch(config)#show snmp-server group

No. Name Sec-Mode Sec-Lev Read-View Write-View Notify-View

--- -------- ------------- ---------- ------------- ------------- --------------

1 nms1 v3 authPriv View1 View1

Switch(config)#end

Switch#copy running-config startup-config

2.2.5Creating SNMP Users (For SNMPv3)

Configure users of the SNMP group. Users belong to the group, and use the same security level and access rights as the group.

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server user name { local | remote } group-name [ smode v3 ] [ slev { noAuthNoPriv | authNoPriv | authPriv }] [ cmode { none | MD5 | SHA }] [ cpwd confirm-pwd ] [ emode { none | DES }] [ epwd encrypt-pwd ]

Configure users of the SNMP group.

name: Enter the user name with 1 to 16 characters.

local | remote: Choose a user type. Local indicates that the user is connected to a local SNMP engine, while remote means that the user is connected to a remote SNMP engine. As the remote engine ID and user password are used to compute the authentication and privacy digests, before configuring a remote user, you need to set the remote engine ID first.

group-name: Enter the name of the group which the user belongs to. The group is determined by the group name, security mode and security level.

v3: Configure the security mode for the user. v3 indicates SNMPv3, the most secure model.

noAuthNoPriv | authNoPriv | authPriv: Choose a security level from noAuthNoPriv (no authorization and no encryption), authNoPriv (authorization and no encryption), authPriv (authorization and encryption). The security level from highest to lowest is: noAuthNoPriv, authNoPriv, authPriv, and the default is noAuthNoPriv. The security level of the user should not be lower than the group it belongs to.

none | MD5 | SHA: Choose an authentication algorithm. SHA authentication mode has a higher security than MD5 mode. By default, the Authentication Mode is none.

confirm-pwd: Enter an authentication password with 1 to 16 characters excluding question mark and space. This password in the configuration file will be displayed in the symmetric encrypted form.

none | DES: Choose a privacy mode. None indicates no privacy method is used, and DES indicates DES encryption method is used. By default, the Privacy Mode is none.

encrypt-pwd: Enter a privacy password with 1 to 16 characters excluding question mark and space. This password in the configuration file will be displayed in the symmetric encrypted form.

Step 3

show snmp-server user

Displays the information of SNMP users.

Step 4

end

Return to privileged EXEC mode.

Step 5

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to create an SNMP user and add it to group nms1. Name the user as admin, and set the user as a remote user, SNMPv3 as the security mode, authPriv as the security level, SHA as the authentication algorithm, 1234 as the authentication password, DES as the privacy algorithm and 1234 as the privacy password:

Switch#configure

Switch(config)#snmp-server user admin remote nms1 smode v3 slev authPriv cmode SHA cpwd 1234 emode DES epwd 1234

Switch(config)#show snmp-server user

No. U-Name U-Type G-Name S-Mode S-Lev A-Mode P-Mode

--- ------ ------ ------ ------ ----- ------ ------

1 admin remote nms1 v3 authPriv SHA DES

Switch(config)#end

Switch#copy running-config startup-config

3Notification Configurations

With Notification enabled, the switch can send notifications to the NMS about important events relating to the device’s operation. This facilitates the monitoring and management of the NMS.

To configure SNMP notification, follow these steps:

1)Configure the information of NMS hosts.

2)Enable SNMP traps.

Configuration Guidelines

To guarantee the communication between the switch and the NMS, ensure the switch and the NMS are able to reach one another.

3.1Using the GUI

3.1.1Configuring the Information of NMS Hosts

Choose the menu MAINTENANCE > SNMP > Notification > Notification Config and click to load the following page.

Figure 3-1 Adding an NMS Host

Follow these steps to add an NMS host:

1)Choose the IP mode according to the network environment, and specify the IP address of the NMS host and the UDP port that receives notifications.

IP Mode

Choose an IP mode for the NMS host.

IP Address

If you set the IP Mode as IPv4, specify an IPv4 address for the NMS host.

If you set the IP Mode as IPv6, specify an IPv6 address for the NMS host.

UDP Port

Specify a UDP port on the NMS host to receive notifications. The default is port 162. For communication security, we recommend that you change the port number under the condition that communications on other UDP ports are not affected.

Specify the user name or community name used by the NMS host, and configure the security model and security level based on the settings of the user or community.

User Name

Choose the user name or community name used by the NMS host.

Security Mode

If a community name (created for SNMPv1/v2c) is entered in User Name, specify the security mode as v1 or v2c. If a user name (created for SNMPv3) is entered in User Name, here displays the security mode as v3.

The NMS host should use the corresponding SNMP version.

Security Level

If Security Level is v3, displays the security level of the user.

2)Choose a notification type based on the SNMP version. If you choose the Inform type, you need to set retry times and timeout interval.

Type

Choose a notification type for the NMS host. For SNMPv1, the supported type is trap. For SNMPv2c and SNMPv3, you can configure the type as trap or inform.

Trap: The switch will send Trap messages to the NMS host when certain events occur. When the NMS host receives a Trap message, it will not send a response to the switch. Thus the switch cannot tell whether a message is received or not, and the messages that are not received will not be resent.

Inform: The switch will send Inform messages to the NMS host when certain events occur. When the NMS host receives an Inform message, it sends a response to the switch. If the switch does not receive a response within the timeout interval, it will resend the Inform message. Therefore, Informs are more reliable than Traps.

Retry

Set the retry times for Informs. The switch will resend the Inform message if it does not receive response from the NMS host within the timeout interval. It will stop sending Inform messages when the retry time reaches the limit.

Timeout

Set the length of time that the switch waits for a response from the NMS host after sending an inform message.

3)Click Create.

3.1.2Enabling SNMP Traps

Choose the menu MAINTENANCE > SNMP > Notification > Trap Config to load the following page.

Figure 3-2 Enabling SNMP Traps

The supported traps are listed on the page. Follow these steps to enable any or all of these traps:

1)Select the traps to enable according to your needs.

SNMP Authentication

Triggered when a received SNMP request fails the authentication.

Coldstart

Indicates an SNMP initialization caused by the reinitialization of the switch system. The trap can be triggered when you reboot the switch.

Warmstart

Indicates the SNMP feature on the switch is reinitialized with the physical configuration unchanged. The trap can be triggered if you disable and then enable SNMP after the SNMP is completely configured and enabled.

Link Status

Triggered when the switch detects a link status change.

CPU Utilization

Triggered when the utilization rate of the CPU has exceeded the limit that you have set. The limit of CPU utilization rate for the switch is 80% by default.

Memory Utilization

Triggered when the memory utilization exceeds 80%.

Flash Operation

Triggered when flash is modified during operations such as backup, reset, firmware upgrade, configuration import, and so on.

VLAN Create/Delete

Triggered when certain VLANs are created or deleted successfully.

IP Change

Monitors the IP address changes of each interface. The trap can be triggered when the IP address of any interface is changed.

Storm Control

Monitors whether the storm rate has reached the limit that you have set. The trap can be triggered when the feature is enabled and broadcast/multicast/unknown-unicast frames are sent to the port with a rate higher than what you have set.

Rate Limit

Monitors whether the bandwidth has reached the limit you have set. The trap can be triggered when the Rate Limit feature is enabled and packets are sent to the port with a rate higher than what you have set.

LLDP

Indicates LLDP topology changes. The trap can be triggered when a new remote device attached to a local port, or a remote device disconnected or moved from one port to another.

Loopback Detection

Triggered when the switch detects a loopback with loopback detection feature, or when a loopback is cleared.

Spanning Tree

Indicates spanning tree changes. The trap can be triggered in the following situations: a port changes from non-forwarding state to forwarding state or the other way round; a port receives a packet with TC flag or a TCN packet.

PoE

Only for products that support PoE feature. Allow all PoE-related traps, including:

Over-max-pwr-budget: Triggered when the total power required by the connected PDs exceeds the maximum power the PoE switch can supply.

Port-pwr-change: Triggered when a port starts to supply power or stops supplying power.

Port-pwr-deny: Triggered when the switch powers off PDs on low-priority PoE ports. When the total power required by the connected PDs exceeds the system power limit, the switch will power off PDs on low-priority PoE ports to ensure stable running of the other PDs.

Port-pwr-over-30w: Triggered when the power required by the connected PD exceeds 30 watts.

Port-pwr-overload: Triggered when the power required by the connected PD exceeds the maximum power the port can supply.

Port-short-circuit: Triggered when a short circuit is detected on a port.

Thermal-shutdown: Triggered when the PSE chip overheats. The switch will stop supplying power in this case.

IP-MAC Binding

Triggered in the following two situations: the ARP Inspection feature is enabled and the switch receives an illegal ARP packet; or the IPv4 Source Guard feature is enabled and the switch receives an illegal IP packet.

IP Duplicate

Triggered when the switch detects an IP conflict event.

DHCP Filter

Triggered when the DHCPv4 Filter feature is enabled and the switch receives DHCP packets from an illegal DHCP server.

DDM Temperature

Only T2600G-28TS supports DDM traps. Monitors the temperature of SFP modules inserted into the SFP ports on the switch. The trap can be triggered when the temperature of any SFP module has reached the warning or alarm threshold.

DDM Voltage

Only T2600G-28TS supports DDM traps. Monitors the voltage of SFP modules inserted into the SFP ports on the switch. The trap can be triggered when the voltage of any SFP module has reached the warning or alarm threshold.

DDM Bias Current

Only T2600G-28TS supports DDM traps. Monitors the bias current of SFP modules inserted into the SFP ports on the switch. The trap can be triggered when the bias current of any SFP module has reached the warning or alarm threshold.

DDM TX Power

Only T2600G-28TS supports DDM traps. Monitors the TX Power of SFP modules inserted into the SFP ports on the switch. The trap can be triggered when the TX Power of any SFP module has reached the warning or alarm threshold.

DDM RX Power

Only T2600G-28TS supports DDM traps. Monitors the RX Power of SFP modules inserted into the SFP ports on the switch. The trap can be triggered when the RX Power of any SFP module has reached the warning or alarm threshold.

ACL Counter

Monitors matched ACL information, including the matched ACL ID, rule ID and the number of the matched packets. With both this trap and the Logging feature in ACL rule settings enabled, the switch will check the matched ACL information every five minutes and send SNMP traps if there is any updated information.

2)Click Apply.

3.2Using the CLI

3.2.1Configuring the NMS Host

Configure parameters of the NMS host and packet handling mechanism.

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server host ip udp-port user-name [smode { v1 | v2c | v3 }] [slev {noAuthNoPriv | authNoPriv | authPriv }] [type { trap | inform}] [retries retries] [timeout timeout]

Configure parameters of the NMS host and packet handling mechanism.

ip: Specify the IP address of the NMS host in IPv4 or IPv6. Please make sure the IP addresses of the NMS host and the switch are able to reach to each other.

udp-port: Specify a UDP port on the NMS host to receive notifications. The default is port 162. For communication security, we recommend that you change the port number under the condition that communications on other UDP ports are not affected.

user-name: Enter the name used by the NMS host. When the NMS host uses SNMPv1 or SNMPv2c, enter the Community Name; when the NMS host uses SNMPv3, enter the User Name of the SNMP Group.

v1 | v2c | v3: Choose the security mode used by the user from the following: SNMPv1, SNMPv2c, SNMPv3. The NMS host should use the corresponding SNMP version.

noAuthNoPriv | authNoPriv | authPriv: For SNMPv3 groups, choose a security level from noAuthNoPriv (no authorization and no encryption), authNoPriv (authorization and no encryption), authPriv (authorization and encryption). The defaut is noAuthNoPriv. Please note that if you have chosen v1 or v2c as the security mode, security level cannot be configured.

trap | inform: Choose a notification type for the NMS host. For SNMPv1, the supported type is trap. For SNMPv2c and SNMPv3, you can configure the type as trap or inform.

When the NMS host receives a trap message, it will not send a response to the switch. Thus the switch cannot tell whether a message is received or not, and the messages that are not received will not be resent. When the NMS host receives an Inform message, it sends a response to the switch. If the switch does not receive a response within the Timeout interval, it will resend the Inform message. Therefore, Informs are more reliable than Traps.

retries: Set the retry times for Inform messages. The range is 1 to 255 and the default is 3. The switch will resend the Inform message if it does not receive response from the NMS host within the timeout interval. And it will stop sending Inform message when the retry times reaches the limit.

timeout: Set the length of time that the switch waits for a response. The range is 1 to 3600 seconds; the default is 100 seconds. The switch will resend the Inform message if it does not receive a response from the NMS host within the timeout interval.

Step 3

show snmp-server host

Displays the information of the host.

Step 4

end

Return to privileged EXEC mode.

Step 5

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to set the NMS host IP address as 192.30.1.222, UDP port as port 162, name used by the NMS host as admin, security model as SNMPv3, security level as authPriv, notification type as Inform, retry times as 3, and the timeout interval as 100 seconds:

Switch#configure

Switch(config)#snmp-server host 192.30.1.222 162 admin smode v3 slev authPriv type inform retries 3 timeout 100

Switch(config)#show snmp-server host

No. Des-IP UDP Name SecMode SecLev Type Retry Timeout

--- ------ ----- ---- ------- ------ ---- ----- -------

1 192.30.1.222 162 admin v3 authPriv inform 3 100

Switch(config)#end

Switch#copy running-config startup-config

3.2.2Enabling SNMP Traps

The switch supports multiple SNMP traps like SNMP standard traps, ACL traps, and VLAN traps. You can enable any or all of the traps according to your needs.

Enabling the SNMP Standard Traps Globally

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server traps snmp [ linkup | linkdown | warmstart | coldstart | auth-failure ]

Enable the corresponding SNMP standard traps. The command without parameter enables all SNMP standard traps. All SNMP standard traps are enabled by default.

linkup: Indicates a port status changes from linkdown to linkup, and can be triggered when you connect a device to a port.

linkdown: Indicates a port status changes from linkup to linkdown, and can be triggered when you disconnect a device to a port.

warmstart: Indicates the SNMP feature on the switch is reinitialized with the physical configuration unchanged. The trap can be triggered if you disable and then enable SNMP after the SNMP is completely configured and enabled.

coldstart: Indicates an SNMP initialization caused by the reinitialization of the switch system. The trap can be triggered when you reboot the switch.

auth-failure: Triggered when a received SNMP request fails the authentication.

Step 3

end

Return to privileged EXEC mode.

Step 4

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to configure the switch to send linkup traps:

Switch#configure

Switch(config)#snmp-server traps snmp linkup

Switch(config)#end

Switch#copy running-config startup-config

Enabling the SNMP Extended Traps Globally

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server traps { rate-limit | cpu | flash | lldp remtableschange | lldp topologychange | loopback-detection | storm-control | spanning-tree | memory }

Enable the corresponding SNMP extended traps. All SNMP extended traps are disabled by default.

rate-limit: Monitors whether the bandwidth has reached the limit you have set. The trap can be triggered when the Rate Limit feature is enabled and packets are sent to the port with a rate higher than what you have set.

cpu: Monitors the load status of the switch CPU. The trap can be triggered when the utilization rate of the CPU has exceeded the limit that you have set. The limit of CPU utilization rate for the switch is 80% by default.

flash: Triggered when flash is modified during operations such as backup, reset, firmware upgrade, configuration import, and so on.

lldp remtableschange: A lldp RemTablesChange notification is sent when the value of lldp StatsRemTableLastChangeTime changes. It can be utilized by an NMS host to trigger LLDP remote systems table maintenance polls.

lldp topologychange: A notification generated by the local device to sense the change in the topology that indicates a new remote device attached to a local port, or a remote device disconnected or moved from one port to another.

loopback-detection: The feature is used to detect loopbacks. And the trap is disabled by default. The system will generate the trap when a loopback is detected or cleared.

storm-control: The feature is used to monitor network storms. And the trap is disabled by default. The system will generate the trap when the rate of broadcast or multicast reaches the limit of storm control.

spanning-tree: The feature is used to monitor the spanning tree status. And the trap is disabled by default. The system will generate the trap in the following situations: a port changes from non-forwarding state to forwarding state or the other way round; a port receives a packet with TC flag or a TCN packet.

memory: The feature is used to monitor the memory. And the trap is disabled by default. The system will generate the trap when the memory utilization exceeds 80%.

Step 3

end

Return to privileged EXEC mode.

Step 4

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to configure the switch to enable bandwidth-control traps:

Switch#configure

Switch(config)#snmp-server traps bandwidth-control

Switch(config)#end

Switch#copy running-config startup-config

Enabling the DDM Traps Globally

Note:

Only T2600G-28TS supports DDM traps.

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server traps ddm [ temperature | voltage | bias_current | tx_power | rx_power ]

Enable the corresponding DDM traps. DDM function is used to monitor the status of the SFP modules inserted into the SFP ports on the switch. The command without parameter enables all SNMP DDM traps. All DDM traps are disabled by default.

temperature: Monitors the temperature of SFP modules inserted into the SFP ports on the switch. The trap can be triggered when the temperature of any SFP module has reached the warning or alarm threshold.

voltage: Monitors the voltage of SFP modules inserted into the SFP ports on the switch. The trap can be triggered when the voltage of any SFP module has reached the warning or alarm threshold.

bias_current: Monitors the bias current of SFP modules inserted into the SFP ports on the switch. The trap can be triggered when the bias current of any SFP module has reached the warning or alarm threshold.

tx_power: Monitors the TX Power of SFP modules inserted into the SFP ports on the switch. The trap can be triggered when the TX Power of any SFP module has reached the warning or alarm threshold.

rx_power: Monitors the RX Power of SFP modules inserted into the SFP ports on the switch. The trap can be triggered when the RX Power of any SFP module has reached the warning or alarm threshold.

Step 3

end

Return to privileged EXEC mode.

Step 4

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to configure the switch to enable DDM temperature trap:

Switch#configure

Switch(config)#snmp-server traps DDM temperature

Switch(config)#end

Switch#copy running-config startup-config

Enabling the VLAN Traps Globally

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server traps vlan [ create | delete ]

Enable the corresponding VLAN traps. The command without parameter enables all SNMP VLAN traps. All VLAN traps are disabled by default.

create: Triggered when certain VLANs are created successfully.

delete: Triggered when certain VLANs are deleted successfully.

Step 3

end

Return to privileged EXEC mode.

Step 4

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to configure the switch to enable all the SNMP VLAN traps:

Switch#configure

Switch(config)#snmp-server traps vlan

Switch(config)#end

Switch#copy running-config startup-config

Enabling the SNMP Security Traps Globally

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server traps security { dhcp-filter | ip-mac-binding }

Enable the corresponding security traps. All security traps are disabled by default.

dhcp-filter: Triggered when the DHCPv4 Filter feature is enabled and the switch receives DHCP packets from an illegal DHCP server.

ip-mac-binding: Triggered when the ARP Inspection feature is enabled and the switch receives an illegal ARP packet, or the IPv4 Source Guard feature is enabled and the switch receives an illegal IP packet.

Step 3

end

Return to privileged EXEC mode.

Step 4

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to configure the switch to enable DHCP filter trap:

Switch#configure

Switch(config)#snmp-server traps security dhcp-filter

Switch(config)#end

Switch#copy running-config startup-config

Enabling the ACL Trap Globally

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server traps security acl

Enable the ACL trap. It is disabled by default.

The trap monitors matched ACL information, including the matched ACL ID, rule ID and the number of the matched packets. With both this trap and the Logging feature in ACL rule settings enabled, the switch will check the matched ACL information every five minutes and send SNMP traps if there is any updated information.

Step 3

end

Return to privileged EXEC mode.

Step 4

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to configure the switch to enable ACL trap:

Switch#configure

Switch(config)#snmp-server traps acl

Switch(config)#end

Switch#copy running-config startup-config

Enabling the IP Traps Globally

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server traps ip { change | duplicate }

Enable the IP traps. All IP traps are disabled by default.

change: Enable SNMP IP change traps. The trap monitors the IP changed of each interface. The trap can be triggered when the IP address of any interface is changed.

duplicate: Enable SNMP IP duplicate traps. The trap can be triggered when the switch

detects an IP conflict event.

Step 3

end

Return to privileged EXEC mode.

Step 4

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to configure the switch to enable IP-Change trap:

Switch#configure

Switch(config)#snmp-server traps ip change

Switch(config)#end

Switch#copy running-config startup-config

Enabling the SNMP PoE Traps Globally

Note:

Only T2600G-28MPS supports PoE traps.

Step 1

configure

Enter global configuration mode.

Step 2

snmp-server traps power [over-max-pwr-budget | port-pwr-change | port-pwr-deny | port-pwr-over-30w | port-pwr-overload | port-short-circuit | thermal-shutdown ]

Enable the PoE traps. The command without parameter enables all PoE traps. All PoE traps are disabled by default.

over-max-pwr-budget: Triggered when the total power required by the connected PDs exceeds the maximum power the PoE switch can supply.

port-pwr-change: Triggered when the total power required by the connected PDs exceeds the maximum power the PoE switch can supply.

port-pwr-deny: Triggered when the switch powers off PDs on low-priority PoE ports. When the total power required by the connected PDs exceeds the system power limit, the switch will power off PDs on low-priority PoE ports to ensure stable running of the other PDs.

port-pwr-over-30w: Triggered when the power required by the connected PD exceeds 30 watts.

port-pwr-overload: Triggered when the power required by the connected PD exceeds the maximum power the port can supply.

port-short-circuit: Triggered when a short circuit is detected on a port.

thermal-shutdown: Triggered when the PSE chip overheats. The switch will stop supplying power in this case.

Step 3

end

Return to privileged EXEC mode.

Step 4

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to configure the switch to enable all PoE traps:

Switch#configure

Switch(config)#snmp-server traps power

Switch(config)#end

Switch#copy running-config startup-config

Enabling the Link-status Trap for Ports

Step 1

configure

Enter global configuration mode.

Step 2

interface {fastEthernet port | range fastEthernet port-list | gigabitEthernet port | range gigabitEthernet port-list | ten-gigabitEthernet port | range ten-gigabitEthernet port-list ]

Configure notification traps on the specified ports.

port/port-list: The number or the list of the Ethernet ports that you desire to configure notification traps.

Step 3

snmp-server traps link-status

Enable the link-status trap. It is triggered when the switch detects a link status change. By default, it is disabled.

Step 4

end

Return to privileged EXEC mode.

Step 5

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to configure the switch to enable link-status trap:

Switch#configure

Switch(config)#interface gigabitEthernet 1/0/1

Switch(config-if)#snmp-server traps link-status

Switch(config-if)#end

Switch#copy running-config startup-config

4RMON

RMON (Remote Network Monitoring) together with the SNMP system allows the network manager to monitor remote network devices efficiently. RMON reduces traffic flow between the NMS and managed devices, which is convenient for management in large networks.

RMON includes two parts: the NMS and the Agents running on every network device. The NMS is usually a host that runs the management software to manage Agents of network devices. And the Agent is usually a switch or router that collects traffic statistics (such as total packets on a network segment during a certain time period, or total correct packets that are sent to a host). Based on SNMP protocol, the NMS collects network data through communication with Agents. However, the NMS cannot obtain every datum of RMON MIB because of the limited device resources. Generally, the NMS can only get information of the following four groups: Statistics, History, Event and Alarm.

Statistics: Collects Ethernet statistics (like the total received bytes, the total broadcast packets, and the total packets of the specified size) on an interface.

History: Collects a history group of statistics on Ethernet ports for a specified polling interval.

Event: Specifies the action to take when an event is triggered by an alarm. The action can be to generate a log entry or an SNMP trap.

Alarm: Monitors a specific MIB object for a specified interval, triggers an event at a specified value (rising threshold or falling threshold).

5RMON Configurations

With RMON configurations, you can:

Configuring the Statistics group.

Configuring the History group.

Configuring the Event group.

Configuring the Alarm group.

Configuration Guidelines

To ensure that the NMS receives notifications normally, please complete configurations of SNMP and SNMP Notification before RMON configurations.

5.1Using the GUI

5.1.1Configuring Statistics Group

Choose the menu MAINTENANCE > SNMP > RMON > Statistics and click to load the following page.

Figure 5-1 Creating a Statistics Entry

Follow these steps to configure the Statistics group:

1)Specify the entry index, the port to be monitored, and the owner name of the entry. Set the entry as Valid or Under Creation.

Index

Enter the index of the entry.

Port

Click Choose to specify an Ethernet port to be monitored in the entry, or enter the port number in the format of 1/0/1.

Owner

Enter the owner name of the entry with1 to 16 characters.

Status

Set the entry as Valid or Under Creation. By default, it is Valid. The switch start to collect Ethernet statistics for a Statistics entry since the entry status is configured as valid.

Valid: The entry is created and valid.

Under Creation: The entry is created but invalid.

2)Click Create.

5.1.2Configuring History Group

Choose the menu MAINTENANCE > SNMP > RMON > History to load the following page.

Figure 5-2 Configuring the History Entry

Follow these steps to configure the History group:

1)Select a History entry, and specify a port to be monitored.

Index

Displays the index of History entries. The switch supports up to 12 History entries.

Port

Specify a port in 1/0/1 format to be monitored.

2)Set the sample interval and the maximum buckets of History entries.

Interval (seconds)

Specify the number of seconds in each polling cycle. Valid values are from 10 to 3600 seconds and the default is 1800 seconds. Every history entry has its own timer. For the monitored port, the switch samples packet information and generates a record in every interval.

Maximum Buckets

Set the maximum number of records for the History entry. When the number of records exceeds the limit, the earliest record will be overwritten. Valid values are from 10 to 130 and the default is 50.

3)Enter the owner name, and set the status of the entry. Click Apply.

Owner

Enter the owner name of the entry with 1 to 16 characters. By default, it is monitor.

Status

Enable or disable the entry. By default, it is disabled.

Enable: The entry is enabled.

Disable: The entry is disabled.

Note:

To change the parameters of a History entry, please enable the entry at the same time, otherwise the change cannot take effect.

5.1.3Configuring Event Group

Choose the menu MAINTENANCE > SNMP > RMON > Event to load the following page.

Figure 5-3 Configuring the Event Entry

Follow these steps to configure the Event group:

1)Choose an Event entry, and set the SNMP User of the entry.

Index

Displays the index of Event entries. The switch supports up to 12 Event entries.

User

Choose an SNMP user name or community name for the entry. The name should be the same as what you have set in SNMP previously.

2)Set the description and action to be taken when the event is triggered.

Description

Enter an brief description of this event to make identifying it easier.

Action Mode

Specify the action for the switch to take when the event is triggered.

None: No action. It is the default setting.

Log: The switch records the event in the log, and the NMS should initiate requests to get notifications.

Notify: The switch initiates notifications to the NMS.

Log & Notify: The switch records the event in the log and sends notifications to the NMS.

3)Enter the owner name, and set the status of the entry. Click Apply.

Owner

Enter the owner name of the entry with 1 to 16 characters. By default, it is monitor.

Status

Enable or disable the entry. By default, it is disabled.

Enable: The entry is enabled.

Disable: The entry is disabled.

5.1.4Configuring Alarm Group

Before you begin, please complete configurations of Statistics entries and Event entries, because the Alarm entries must be associated with Statistics and Event entries.

Choose the menu MAINTENANCE > SNMP > RMON > Alarm to load the following page.

Figure 5-4 Configuring the Alarm Entry

Follow these steps to configure the Alarm group:

1)Select an alarm entry, choose a variable to be monitored, and associate the entry with a statistics entry.

Index

Displays the index of Alarm entries. The switch supports up to 12 Alarm entries.

Variable

Set the alarm variable to be monitored. The switch will monitor the specified variable in sample intervals and act in the set way when the alarm is triggered. The default variable is RecBytes.

RecBytes: Total received bytes.

RecPackets: Total received packets.

BPackets: Total broadcast packets.

MPackets: Total multicast packets.

CRC&Align ERR: Packets that range from 64 to 1518 bytes and contain FCS Error or Alignment Error.

Undersize: Packets that are smaller than 64 bytes.

Oversize: Packets that are larger than 1518 bytes.

Jabbers: Packets that are sent when port collisions occur.

Collisions: Collision times in the network segment.

64, 65-127, 128-255, 256-511, 512-1023, 1024-10240: Total packets of the specified size.

Statistics

Associate the Alarm entry with a Statistics entry. Then the switch monitors the specified variable of the Statistics entry.

2)Set the sample type, the rising and falling threshold, the corresponding event action mode, and the alarm type of the entry.

Sample Type

Set the sampling method of the specified variable; the default is absolute.

Absolute: Compare the sampling value against the preset threshold.

Delta: The switch obtains the difference between the sampling values of the current interval and the previous interval, and then compares the difference against the preset threshold.

Rising Threshold

Set the rising threshold of the variable. When the sampled value exceeds the threshold, the system will trigger the corresponding Rising Event. Valid values are from 1 to 2147483647 and the default is 100.

Rising Event

Specify the index of the Event entry that will be triggered when the sampled value exceeds the preset threshold. The Event entry specified here should be enabled first.

Falling Threshold

Set the falling threshold of the variable. When the sampled value is below the threshold, the system will trigger the corresponding Falling Event. Valid values are from 1 to 2147483647 and the default is 100.

Falling Event

Specify the index of the Event entry that will be triggered when the sampled value is below the preset threshold. The Event entry specified here should be enabled first.

Alarm Type

Specify the alarm type for the entry. By default, the alarm type is all.

Rising: The alarm is triggered only when the sampled value exceeds the rising threshold.

Falling: The alarm is triggered only when the sampled value is below the falling threshold.

All: The alarm is triggered when the sampled value exceeds the rising threshold or is below the falling threshold.

3)Enter the owner name, and set the status of the entry. Click Apply.

Interval (seconds)

Set the sampling interval. Valid values are from 10 to 3600 seconds and the default is 1800 seconds.

Owner

Enter the owner name of the entry with 1 to 16 characters. By default, it is monitor.

Status

Enable or disable the entry. By default, it is disabled.

Enable: The entry is enabled.

Disable: The entry is disabled.

5.2Using the CLI

5.2.1Configuring Statistics

Step 1

configure

Enter global configuration mode.

Step 2

rmon statistics index interface interface { fastEthernet port | gigabitEthernet port | ten-gigabitEthernet port } [ owner owner-name] [ status { underCreation | valid }]

Configure RMON Statistic entries.

index: Enter the ID of the statistics entry from 1 to 65535 in the format of 1-3 or 5.

port: Enter the port number in 1/0/1 format to bind it to the entry.

owner-name: Enter the owner name of the entry with 1 to 16 characters. The default name is monitor.

underCreation | valid: Enter the status of the entry. UnderCreation indicates that the entry is created but invalid, while valid indicates the entry is created and valid. By default, it is valid.

The switch start to collect Ethernet statistics for a Statistics entry since the entry status is configured as valid.

Step 3

show rmon statistics [ index ]

Displays the statistics entries and their configurations.

index: Enter the index of statistics entries that you want to view. The ranges are from 1 to 65535.

Step 4

end

Return to privileged EXEC mode.

Step 5

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to create two Statistics entries on the switch to monitor port 1/0/1 and 1/0/2 respectively. The owner of the entries are both monitor and the status are both valid:

Switch#configure

Switch(config)#rmon statistics 1 interface gigabitEthernet 1/0/1 owner monitor status valid

Switch(config)#rmon statistics 2 interface gigabitEthernet 1/0/2 owner monitor status valid

Switch(config)#show rmon statistics

Index Port Owner State

----- ---- ----- -----

1 Gi1/0/1 monitor valid

2 Gi1/0/2 monitor valid

Switch(config)#end

Switch#copy running-config startup-config

5.2.2Configuring History

Step 1

configure

Enter global configuration mode.

Step 2

rmon history index interface { fastEthernet port | gigabitEthernet port | ten-gigabitEthernet port } [ interval seconds ] [ owner owner-name ] [ buckets number ]

Configuring RMON History entries.

index: Enter the index of the History entry from 1 to 12 in the format of 1-3 or 5.

port: Enter the port number in 1/0/1 format to bind it to the entry.

seconds: Set the sample interval. The values are from 10 to 3600 seconds; the default is 1800 seconds.

owner-name: Enter the owner name of the entry with 1 to 16 characters. The default name is monitor.

number: Set the maximum number of records for the history entry. When the number of records exceeds the limit, the earliest record will be overwritten. The values are from 10 to 130; the default is 50.

Step 3

show rmon history [ index ]

Displays the specified History entry and related configurations.

index: Enter the index of history entries that you want to view. The range is 1 to 12, and the format is 1-3 or 5.

Step 4

end

Return to privileged EXEC mode.

Step 5

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to create a History entry on the switch to monitor port 1/0/1. Set the sample interval as 100 seconds, maximum buckets as 50, and the owner as monitor:

Switch#configure

Switch(config)#rmon history 1 interface gigabitEthernet 1/0/1 interval 100 owner monitor buckets 50

Switch(config)#show rmon history

Index Port Interval Buckets Owner State

----- --------- ----------- ----------- --------- -----

1 Gi1/0/1 100 50 monitor Enable

Switch(config)#end

Switch#copy running-config startup-config

5.2.3Configuring Event

Step 1

configure

Enter global configuration mode.

Step 2

rmon event index [ user user-name ] [ description description ] [ type { none | log | notify | log-notify }] [ owner owner-name ]

Configuring RMON Event entries.

index: Enter the index of the Event entry from 1 to12 in the format of 1-3 or 5.

user-name: Enter the SNMP user name or community name of the entry. The name should be what you have set in SNMP previously. The default name is public.

description: Give a description to the entry with 1 to 16 characters. By default, the description is empty.

none | log | notify | log-notify: Specify the action type of the event; then the switch will take the specified action to deal with the event. By default, the type is none. None indicates the switch takes no action, log indicates the switch records the event, notify indicates the switch sends notifications to the NMS, and log-notify indicates the switch records the event and sends notifications to the NMS.

owner-name: Enter the owner name of the entry with 1 to 16 characters. The default name is monitor.

Step 3

show rmon event [ index ]

Displays the specified Event entry and related configurations.

index: Enter the index of Event entries that you want to view. The range is 1 to 12, and the format is 1-3 or 5.

Step 4

end

Return to privileged EXEC mode.

Step 5

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to create an Event entry on the switch. Set the user name as admin, the event type as Notify (set the switch to initiate notifications to the NMS), and the owner as monitor:

Switch#configure

Switch(config)#rmon event 1 user admin description rising-notify type notify owner monitor

Switch(config)#show rmon event

Index User Description Type Owner State

----- ---- ----------- ---- ----- -----

1 admin rising-notify Notify monitor Enable

Switch(config)#end

Switch#copy running-config startup-config

5.2.4Configuring Alarm

Step 1

configure

Enter global configuration mode.

Step 2

rmon alarm index stats-index sindex [ alarm-variable { revbyte | revpkt | bpkt | mpkt | crc-align | undersize | oversize | jabber | collision | 64 | 65-127 | 128-255 | 256-511 | 512-1023 | 1024-10240}] [ s-type {absolute | delta}] [ rising-threshold r-hold ] [ rising-event-index r-event ] [ falling-threshold f-hold ] [ falling-event-index f-event ] [ a-type {rise | fall | all} ] [ owner owner-name ] [ interval interval ]

Configuring RMON alarm entries.

index: Enter the index of the alarm entry from 1 to12 in the format of 1-3 or 5.

sindex: Set the index of the related statistics entry from 1 to 65535.

revbyte | revpkt | bpkt | mpkt | crc-align | undersize | oversize | jabber | collision | 64 | 65- 127 | 128-255 | 256-511 | 512-1023 | 1024-10240: Choose an alarm variable to monitor. The switch will monitor the specified variable in sample intervals and act in the set way when the alarm is triggered. The default variable is revbyte.

revbyte means total received bytes; revpkt means total received packets; bpkt means total broadcast packets. mpkt means total multicast packets; crc-align means packets that range from 64 to 1518 bytes and contain FCS Error or Alignment Error; undersize means packets that are smaller than 64 bytes; oversize means packets that are larger than 1518 bytes; jabber means packets that are sent when port collisions occur; collision means the collision times in the network segment; 64 | 65-127 | 128-255 | 256-511 | 512-1023 | 1024-10240 means total packets of the specified size.

absolute | delta: Choose the sampling method of the specified variable. The default is absolute. In the absolute mode, the switch compares the sampling value against the preset threshold; in the delta mode, the switch obtains the difference between the sampling values of the current interval and the previous interval, and then compares the difference against the preset threshold.

r-hold: Enter the rising threshold from 1 to 2147483647; the default is 100.

r-event: Enter the Event entry index from 1 to 12 to bind it to the rising threshold. The event entry will be triggered when the sampling value exceeds the preset threshold. The Event entry specified here should be enabled first.

f-hold: Enter a falling threshold from 1 to 2147483647; the default is 100.

f-event: Enter the Event entry index from 1 to 12 to bind it to the falling threshold. The Event entry will be triggered when the sampling value goes below the preset threshold. The Event entry specified here should be enabled first.

rise | fall | all: Choose an alarm type; the default is all. Rise indicates that the alarm is triggered only when the sampled value exceeds the rising threshold. Fall indicates that the alarm is triggered only when the sampled value is below the falling threshold. All indicates that the alarm is triggered when the sampled value exceeds the rising threshold or is below the falling threshold.

owner-name: Enter the owner name of the entry using 1 to 16 characters. The default name is monitor.

interval: Set the sampling interval. The value ranges from 10 to 3600 seconds; the default is 1800 seconds.

Step 3

show rmon alarm [ index ]

Displays the specified alarm entry and related configurations.

index: Enter the index of alarm entries that you want to view. The range is 1 to 12, and the format is 1-3 or 5.

Step 4

end

Return to privileged EXEC mode.

Step 5

copy running-config startup-config

Save the settings in the configuration file.

The following example shows how to set an alarm entry to monitor BPackets on the switch. Set the related Statistics entry ID as 1, the sample type as Absolute, the rising threshold as 3000, the related rising event entry index as 1, the falling threshold as 2000, the related falling event index as 2, the alarm type as all, the notification interval as 10 seconds, and the owner of the entry as monitor:

Switch#configure

Switch(config)#rmon alarm 1 stats-index 1 alarm-variable bpkt s-type absolute rising-threshold 3000 rising-event-index 1 falling-threshold 2000 falling-event-index 2 a-type all interval 10 owner monitor

Switch(config)#show rmon alarm

Index-State: 1-Enabled

Statistics index: 1

Alarm variable: BPkt

Sample Type: Absolute

RHold-REvent: 3000-1

FHold-FEvent: 2000-2

Alarm startup: All

Interval: 10

Owner: monitor

Switch(config)#end

Switch#copy running-config startup-config

6Configuration Example

6.1Network Requirements

The following figure shows the network topology of a company. The company has requirements as follows:

1)Monitor traffic flow of ports 1/0/1 and 1/0/2 on Switch A, and send notifications to the NMS when the actual rate of transmitting and receiving packets exceeds the preset threshold.

2)Monitor the sending status of ports 1/0/1 and 1/0/2 on Switch A, and regularly collect and save data for follow-up checks. Specifically, during the sample interval, switch A should notify the NMS when the number of packets transmitted and received on the port exceeds the preset threshold; Switch A should record but not notify the NMS when the number of packets transmitted and received is below the threshold.

The NMS host with IP address 192.168.1.222 is connected to the core switch, Switch B. Switch A is connected to Switch B via port 1/0/3. And port 1/0/3 and the NMS are able to reach one another.

Figure 6-1 Network Topology

6.2Configuration Scheme

1)Set a limit on the rate of the specified ports, and then enable SNMP on Switch A. Configure SNMP and Notification, and enable Trap notifications on the ports. Switch A can then send notifications to the NMS when the actual rate exceeds the preset threshold.

2)After SNMP and Notification configurations, you need to create Statistic entries on the ports to monitor the real-time transmitting and receiving of packets and create History entries to regularly collect and save related data. Create two Event entries: one is the notify type used to notify the NMS, the other is the log type used to record related events. In addition, create an Alarm entry to monitor BPackets (Broadcast Packets), set the rising threshold and falling threshold, and bind the rising event to the notify event entry, and the falling event to the log event entry.

Demonstrated with T2600G-28TS, this chapter provides configuration procedures in two ways: using the GUI and using the CLI.

6.3Using the GUI

Configuring Rate Limit on ports

Configure the rate limit on required ports. For detailed configuration, please refer to Configuring QoS_T2600G&T1600G-52TS v3&T1600G-52PS v3 or Configuring QoS_T1500&T1500G&T1600G.

Configuring SNMP

1)Choose MAINTENANCE > SNMP > Global Config to load the following page. In the Global Config section, enable SNMP, and set the Remote Engine ID as 123456789a. Click Apply.

Figure 6-2 Enabling SNMP

2)In the SNMP View Config section, click to load the following page. Name the SNMP view as View, set the view type as Include, and set MIB Object ID as 1 (which means all functions). Click Create.

Figure 6-3 Creating an SNMP View

3)Choose MAINTENANCE > SNMP > SNMP v3 > SNMP Group and click to load the following page. Create a group with the name of nms-monitor, enable authentication and privacy, and add View to Read View and Notify View. Click Create.

Figure 6-4 Configuring an SNMP Group

4)Choose MAINTENANCE > SNMP > SNMP v3 > SNMP User and click to load the following page. Create a user named admin for the NMS, set the user type as Remote User and specify the group name. Set the Security Level in accordance with that of the group nms-monitor. Choose SHA authentication algorithm and DES privacy algorithm, and set corresponding passwords. Click Create.

Figure 6-5 Creating an SNMP User

5)Choose MAINTENANCE > SNMP > Notification > Notification Config and click to load the following page. Choose the IP Mode as IPv4, and specify the IP address of the NMS host and the port of the host for transmitting notifications. Specify the User as admin and choose the type as Inform. Set the retry times as 3, with the timeout period as 100 seconds. Click Create.

Figure 6-6 Creating an SNMP Notification Entry

6)Choose MAINTENANCE > SNMP > Notification > Trap Config to load the following page. Enable Rate Limit trap and click Apply.

Figure 6-7 Enabling Rate Limit Trap

7)Click to save the settings.

Configuring RMON

1)Choose MAINTENANCE > SNMP > RMON > Statistics and click to load the following page. Create two entries and bind them to ports 1/0/1 and 1/0/2 respectively. Set the owner of the entries as monitor and the status as valid.

Figure 6-8 Configuring Statistics Entry 1

Figure 6-9 Configuring Statistics Entry 2

2)Choose the menu MAINTENANCE > SNMP > RMON > History to load the following page. Configure entries 1 and 2. Bind entries 1 and 2 to ports 1/0/1 and 1/0/2 respectively, and set the Interval as 100 seconds, Maximum Buckets as 50, the owner of the entries as monitor, and the status as Enable.

Figure 6-10 Configuring the History Entries

3)Choose the menu MAINTENANCE > SNMP > RMON > Event to load the following page. Configure entries 1 and 2. For entry 1, set the SNMP user name as admin, type as Notify, description as “rising_notify”, owner as monitor, and status as enable. For entry 2, set the SNMP user name as admin, type as Log, description as “falling_log”, owner as monitor, and status as enable.

Figure 6-11 Configuring the Event Entries

4)Choose MAINTENANCE > SNMP > RMON > Alarm to load the following page. Configure entries 1 and 2. For entry 1, set the alarm variable as BPackets, related statistics entry ID as 1 (bound to port 1/0/1), the sample type as Absolute, the rising threshold as 3000, associated rising event entry ID as 1 (which is the notify type), the falling threshold as 2000, the associated falling event entry ID as 2 (which is the log type), the alarm type as All, the interval as 10 seconds, the owner name as monitor. For entry 2, set the associated statistics entry ID as 2 (bound to port 1/0/2). Other configurations are the same as those of entry 1.

Figure 6-12 Configuring the Alarm Entries

5)Click to save settings.

6.4Using the CLI

Configuring Rate Limit on ports

Configure the rate limit on required ports of Switch A. For detailed configuration, please refer to Configuring QoS_T2600G&T1600G-52TS v3&T1600G-52PS v3 or Configuring QoS_T1500&T1500G&T1600G.

Configuring SNMP

1)Enable SNMP and specify the remote engine ID.

Switch_A#configure

Switch_A(config)#snmp-server

Switch_A(config)#snmp-server engineID remote 123456789a

2)Create a view with the name View; set the MIB Object ID as 1 (which represents all functions), and the view type as Include.

Switch_A(config)#snmp-server view View 1 include

3)Create a group of SNMPv3 with the name of nms-monitor. Enable Auth Mode and Privacy Mode, and set the view as read View and notify view.

Switch_A(config)#snmp-server group nms-monitor smode v3 slev authPriv read View notify View

4)Create an SNMP user with the name admin. Set the user as a remote user and configure the security mode and security level based on the group. Set the Auth Mode as SHA algorithm, password as 1234, the Privacy Mode as DES, and password as 1234.

Switch_A(config)#snmp-server user admin remote nms-monitor smode v3 slev authPriv cmode SHA cpwd 1234 emode DES epwd 1234

5)To configure Notification, specify the IP address of the NMS host and UDP port. Set the User, Security Model and Security Level according to configurations of the SNMP User. Choose the type as Inform, and set the retry times as 3, and the timeout period as 100 seconds.

Switch_A(config)#snmp-server host 192.168.1.222 162 admin smode v3 slev authPriv type inform retries 3 timeout 100

Enable Bandwith-control Trap

Switch_A(config)#snmp-server traps bandwidth-control

Configuring RMON

1)Create two Statistics entries to monitor ports 1/0/1 and 1/0/2 respectively. The owner of the entries is set as monitor, and the status is set as valid.

Switch_A(config)#rmon statistics 1 interface gigabitEthernet 1/0/1 owner monitor status valid

Switch_A(config)#rmon statistics 2 interface gigabitEthernet 1/0/2 owner monitor status valid

2)Create two History entries and bind them to ports 1/0/1 and 1/0/2 respectively. Set the sample interval as 100 seconds, max buckets as 50, and the owner as monitor.

Switch_A(config)#rmon history 1 interface gigabitEthernet 1/0/1 interval 100 owner monitor buckets 50

Switch_A(config)#rmon history 2 interface gigabitEthernet 1/0/2 interval 100 owner monitor buckets 50

3)Create two Event entries named admin, which is the SNMP user name. Set entry 1 as the Notify type and its description as “rising_notify”. Set entry 2 as the Log type and its description as “falling_log”. Set the owner of them as monitor.

Switch_A(config)#rmon event 1 user admin description rising_notify type notify owner monitor

Switch_A(config)#rmon event 2 user admin description falling_log type log owner monitor

4)Create two Alarm entries. For entry 1, set the alarm variable as BPackets, associated Statistics entry ID as 1 (bound to port 1/0/1), the sample type as Absolute, the rising threshold as 3000, the associated rising event entry ID as 1 (Notify type), the falling threshold as 2000, the associated falling event entry ID as 2 (the log type), the alarm type as all, the interval as 10 seconds, and the owner name as monitor. For entry 2, set the associated statistics entry ID as 2 (bound to port 1/0/2), while all other configurations are the same as those of entry 1.

Switch_A(config)#rmon alarm 1 stats-index 1 alarm-variable bpkt s-type absolute rising-threshold 3000 rising-event-index 1 falling-threshold 2000 falling-event-index 2 a-type all interval 10 owner monitor

Switch_A(config)#rmon alarm 2 stats-index 2 alarm-variable bpkt s-type absolute rising-threshold 3000 rising-event-index 1 falling-threshold 2000 falling-event-index 2 a-type all interval 10 owner monitor

Verify the Configurations

Verify global SNMP configurations:

Switch_A(config)#show snmp-server

SNMP agent is enabled.

0 SNMP packets input

0 Bad SNMP version errors

0 Unknown community name

0 Illegal operation for community name supplied

0 Encoding errors

0 Number of requested variables

0 Number of altered variables

0 Get-request PDUs

0 Get-next PDUs

0 Set-request PDUs

0 SNMP packets output

0 Too big errors(Maximum packet size 1500)

0 No such name errors

0 Bad value errors

0 General errors

0 Response PDUs

0 Trap PDUs

Verify SNMP engine ID:

Switch_A(config)#show snmp-server engineID

Local engine ID: 80002e5703000aeb13a23d

Remote engine ID: 123456789a

Verify SNMP view configurations:

Switch_A(config)#show snmp-server view

No. View Name Type MOID

--- -------------- ------- -------------------

1 viewDefault include 1

2 viewDefault exclude 1.3.6.1.6.3.15

3 viewDefault exclude 1.3.6.1.6.3.16

4 viewDefault exclude 1.3.6.1.6.3.18

5 View include 1

Verify SNMP group configurations:

Switch_A(config)#show snmp-server group

No. Name Sec-Mode Sec-Lev Read-View Write-View Notify-View

--- ------------- ----------- ---------- --------------- ------------ ----------

1 nms-monitor v3 authPriv View View

Verify SNMP user configurations:

Switch_A(config)#show snmp-server user

No. U-Name U-Type G-Name S-Mode S-Lev A-Mode P-Mode

--- ----------- ------ ------ ------ ----- ------ ------

1 admin remote nms-monitor v3 authPriv SHA DES

Verify SNMP host configurations:

Switch_A(config)#show snmp-server host

No. Des-IP UDP Name SecMode SecLev Type Retry Timeout

--- ---------------- ----- -------- --------- ---------- ------- ----- --------

1 172.168.1.222 162 admin v3 authPriv inform 3 100

Verify RMON statistics configurations:

Switch_A(config)#show rmon statistics

Index Port Owner State

----- ---------- --------- -------

1 Gi1/0/1 monitor valid

2 Gi1/0/2 monitor valid

Verify RMON history configurations:

Switch_A(config)#show rmon history

Index Port Interval Buckets Owner State

----- --------- -------- --------- ---------- ---------

1 Gi1/0/1 100 50 monitor Enable

2 Gi1/0/2 100 50 monitor Enable

Verify RMON event configurations:

Switch_A(config)#show rmon event

Index User Description Type Owner State

----- ------ ----------- -------- ---------- ----------

1 admin rising-notify Notify monitor Enable

2 admin falling-log Log monitor Enable

Verify RMON alarm configurations:

Switch_A(config)#show rmon alarm

Index-State: 1-Enabled

Statistics index: 1

Alarm variable: BPkt

Sample Type: Absolute

RHold-REvent: 3000-1

FHold-FEvent: 2000-2

Alarm startup: All

Interval: 10

Owner: monitor

Index-State: 2-Enabled

Statistics index: 2

Alarm variable: BPkt

Sample Type: Absolute

RHold-REvent: 3000-1

FHold-FEvent: 2000-2

Alarm startup: All

Interval: 10

Owner: monitor

7Appendix: Default Parameters

Default settings of SNMP are listed in the following tables.

Table 7-1Default Global Config Settings

Parameter

Default Setting

SNMP

Disable

Local Engine ID

Automatically

Remote Engine ID

None

Table 7-2Default SNMP View Table Settings

View Name

View Type

MIB Object ID

viewDefault

Include

1

viewDefault

Exclude

1.3.6.1.6.3.15

viewDefault

Exclude

1.3.6.1.6.3.16

viewDefault

Exclude

1.3.6.1.6.3.18

Table 7-3Default SNMP v1/v2c Settings

Parameter

Default Setting

Community Entry

No entries

Community Name

None

Access

Read-only

MIB View

viewDefault

Table 7-4Default SNMP v3 Settings

Parameter

Default Setting

SNMP Group

Group Entry

No entries

Group Name

None

Security Model

v1

Security Level

NoAuthNoPriv

Read View

viewDefault

Write View

None

Notify View

None

SNMP User

User Entry

No entries

User Name

None

User Type

Local User

Group Name

None

Security Model

v1

Security Level

noAuthNoPriv

Authentication Mode

MD5 (when Security Level is configured as AuthNoPriv or AuthPriv)

Authentication Password

None

Privacy Mode

DES (when Security Level is configured as AuthPriv)

Privacy Password

None

Default settings of Notification are listed in the following table.

Table 7-5Default Notification Settings

Parameter

Default Setting

Notification Config

Notification Entry

No entries

IP Mode

IPv4

IP Address

None

UDP Port

162

User

None

Security Model

v1

Security Level

noAuthNoPriv

Type

Trap

Retry

None in trap mode; 3 times in Inform mode.

Timeout

None in trap mode; 100 seconds in Inform mode.

Trap Config

Enabled SNMP Traps

SNMP Authentication, Coldstart, Warmstart, Link Status

Default settings of RMON are listed in the following tables.

Table 7-6Default Statistics Config Settings

Parameter

Default Setting

Statistics Entry

No entries

ID

None

Port

None

Owner

None

IP Mode

Valid

Table 7-7Default Settings for History Entries

Parameter

Default Setting

Port

1/0/1

Interval

1800 seconds

Max Buckets

50

Owner

monitor

Status

Disable

Table 7-8Default Settings for Event Entries

Parameter

Default Setting

User

public

Description

None

Type

None

Owner

monitor

Status

Disable

Table 7-9Default Settings for Alarm Entries

Parameter

Default Setting

Variable

RecBytes

Statistics

0, means no Statistics entries is selected.

Sample Type

Absolute

Rising Threshold

100

Rising Event

None

Falling Threshold

100

Falling Event

None

Alarm Type

All

Interval

1800 seconds

Owner

monitor

Status

Disable