Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In addition to the browser-based interface accessible via HTTP (port 80) and HTTPS (port 443), NetMRI supports a command line interface accessible via SSH (port 22). The Administrative Shell accepts a variety of commands that In addition to the browser-based interface accessible via HTTP (port 80) and HTTPS (port 443), NetMRI supports a command line interface accessible via SSH (port 22). The Administrative Shell accepts a variety of commands that are useful for troubleshooting and maintenance.

...

Anchor
halt command
halt command
halt command

Use this command to shut down NetMRI, then shut down the server, and then power off.

Anchor
InstallHelpFiles command
InstallHelpFiles command
Anchor
bookmark867
bookmark867
installhelpfiles command

...

Note

The NetMRI NT-1400 appliance is licensed as standalone even if the OC license is applied. For information about the NetMRI NT-1400 appliance, see Operations Center Appliances and Requirements.


Note

For the Customer Name field, use only US-ASCII symbols.

Example 1 Sample output when you continue to use an existing license

...

0.0255.255.0.0

Destination

Gateway

Genmask


Flags


MSS


Window


irtt

Iface

0.0.0.0

10.120.25.1

0.0.0.0


UG


0


0


0

eth0

10.0.0.0

10.120.25.1

255.0.0.

0


UG


0


0


0

eth0

10.120.25.10

0.0.0.0

255.255.255.0


UGU


0


0


0

eth0

10169.0254.0.0

100.1200.250.10

255.0255.0.0


UGU


0


0


0

eth0

10169.120254.251.0

0.0.0.0

255.255.255.00


U


0


0


0

eth0

Kernel IPv6 routing table










Destination


Next Hop

Flags


Metric


Ref


Use


Iface

::1/128


::

U


256


0


0


lo

fe80::/64


::

U


0256


0


0


eth0

169.254.0.0

0.0.0.0

::1/128


::

U


0


68


1


lo

fe80::250:56ff:fe94:98/128

::

U


0


00


1

eth0


169.254.1.0

0.0.0.0

255.255.255.0

U

0lo

ff00::/8


::

U


256


0


0


eth0

Kernel IPv6 routing table

Destination

Next Hop

Flags

Metric

Ref

Use

Iface

::1/128

::

U

256

0

0

lo

fe80::/64

::

U

256

0

0

eth0

::1/128

::

U

0

68

1

lo

fe80::250:56ff:fe94:98/128

::

U

0

0

1

lo

ff00::/8

::

U

256

0

0

eth0

...

Obtain a tree of information from a network device using automatic SNMP GETNEXT commands. In NetMRI’s administrative shell version of the snmpwalk command, you can specify the SNMP version, the community string, and the desired Root Object ID (OID).

For SNMP v3, you can additionally specify the encryption protocol from the following:

  • aes-128
  • aes-192
  • aes-192C (for Cisco devices only)
  • aes-256
  • aes-256C (for Cisco devices only)
  • des
  • 3des

The command’s syntax is:

snmpwalk 22

...

Anchor
SNMPWALK command
SNMPWALK command
snmpwalk command

Obtain a tree of information from a network device using automatic SNMP GETNEXT commands. In NetMRI’s administrative shell version of the snmpwalk command, you can specify the SNMP version, the community string, and the desired Root Object ID (OID).

For SNMP v3, you can additionally specify the encryption protocol from the following:

  • aes-128
  • aes-192
  • aes-192C (for Cisco devices only)
  • aes-256
  • aes-256C (for Cisco devices only)
  • des
  • 3des

The command’s syntax is:

snmpwalk 22

The command prompts for further information before executing (if only one network view exists in the NetMRI appliance, you will not be prompted to enter that value):

SA4-17> snmpwalk

Enter SNMP hostname or IP address []: 172.19.4.192

Enter Network View []: MGMT

Enter SNMP version (1, 2c, 3) [2c]: 3

Enter SNMP Username ]: aes_username

SNMP Authentication [no]: yes

Enter SNMP Authentication Passphrase ]: my_passwd

Enter SNMP Authentication Protocol [MD5]: sha

SNMP Privacy [no]: yes

Enter SNMP Privacy Passphrase ]: my_aes_passwd

Enter SNMP Privacy Protocol [DES]: aes-256

Enter Root OID to start walk [system]:

Use legacy snmpwalk tool [n]:

+++ Executing snmpwalk ...

#######################################################################

# Generated by NetMRI Administrator SNMP Walk


# SerialNo : 4850201904810449

# SNMP Host: 172.19.4.192

# SNMP Root: system

# StartTime: Mon Aug302:01:06 PDT 2020

#######################################################################


sysDescr.0 = DisplayString : Linux stsitou-deb10 4.19.0-8-amd64 #1 SMP Debian 4.19.98-1 (2020-01-26) x86_64


sysObjectID.0 = ObjectIdentifier : 1.3.6.1.4.1.8072.3.2.10 (Net-SNMP Net-SNMP

sysUpTime.0 = TimeTicks : 40923950

sysContact.0 = DisplayString : Me <me@example.org>

sysName.0 = DisplayString : stsitou-deb10

sysLocation.0 = DisplayString : Sitting on the Dock of the Bay







NetManager_West> snmpwalk 192.168.1.1

...