In addition to the browser-based interface accessible via HTTP (port 80) and HTTPS (port 443), NetMRI supports a command line interface accessible via SSH (port In addition to the browser-based interface accessible via HTTP (port 80) and HTTPS (port 443), NetMRI supports a command line interface accessible via SSH (port 22). The Administrative Shell accepts a variety of commands that are useful for troubleshooting and maintenance.
...
Anchor | ||||
---|---|---|---|---|
|
Use this command to shut down NetMRI, then shut down the server, and then power off.
Anchor | ||||
---|---|---|---|---|
|
Anchor | ||||
---|---|---|---|---|
|
...
Note |
---|
The NetMRI NT-1400 appliance is licensed as standalone even if the OC license is applied. For information about the NetMRI NT-1400 appliance, see Operations Center Appliances and Requirements. |
Note |
---|
For the Customer Name field, use only US-ASCII symbols. |
Example 1 Sample output when you continue to use an existing license
...
The command prompts for further information before executing (if only one network view exists in the NetMRI appliance, you will not be prompted to enter that value):
SA4-17> snmpwalk
Enter SNMP hostname or IP address []: 172.19.4.192
Enter Network View []: MGMT
Enter SNMP version (1, 2c, 3) [2c]: 3
Enter SNMP Username [ ]: aes_username
SNMP Authentication [no]: yes
Enter SNMP Authentication Passphrase [ ]: my_passwd
Enter SNMP Authentication Protocol [MD5]: sha
SNMP Privacy [no]: yes
Enter SNMP Privacy Passphrase [ ]: my_aes_passwd
Enter SNMP Privacy Protocol [DES]: aes-256
Enter Root OID to start walk [system]:
Use legacy snmpwalk tool [n]:
+++ Executing snmpwalk ...
#######################################################################
# Generated by NetMRI Administrator SNMP Walk
...
# StartTime: Mon Aug302:01:06 PDT 2020
#######################################################################
sysDescr.0 = DisplayString : Linux stsitou-deb10 4.19.0-8-amd64 #1 SMP Debian 4.19.98-1 (2020-01-26) x86_64
sysObjectID.0 = ObjectIdentifier : 1.3.6.1.4.1.8072.3.2.10 (Net-SNMP Net-SNMP
sysUpTime.0 = TimeTicks : 40923950
sysContact.0 = DisplayString : Me <me@
example.org
>
sysName.0 = DisplayString : stsitou-deb10
sysLocation.0 = DisplayString : Sitting on the Dock of the Bay
NetManager_West> snmpwalk 192.168.1.1
Enter Network View: West-Lab
Enter SNMP hostname or IP address []: 192.168.1.1
Enter SNMP version [2c]: 3
Enter SNMP Username []: user_name
SNMP Authentication [no]: yes
Enter SNMP Authentication Passphrase: auth_pwd
Enter SNMP Authentication Protocol [MD5]: SHA
SNMP Privacy [no]: yes
Enter SNMP Privacy Passphrase []: privacy_pwd
Enter SNMP Privacy Protocol [DES]: aes-256
Enter Root OID to start walk [system]: 1.3
Use legacy snmpwalk tool [n]:
+++ Executing snmpwalk ...
#######################################################################
# Generated by NetMRI Administrator SNMP Walk
# SerialNo : VM-C64E-FA34C
# SNMP Host: 192.168.1.1
# SNMP Root: 1.3
# StartTime: Mon Jul 20 15:02:16 EDT 2020
#######################################################################
2020-07-20 15:02:33 [warn] snmpwalk: No response from remote host '192.168.1.1'
#######################################################################
# EndTime: Mon Jul 20 15:02:33 EDT sysServices.0 = Integer32 : 4
sysORLastChange.0 = TimeStamp : 0
sysORID.1 = ObjectIdentifier : 1.3.6.1.6.3.10.3.1.1 (snmpFrameworkMIBCompliance)
sysORID.2 = ObjectIdentifier : 1.3.6.1.6.3.11.3.1.1 (snmpModules)
sysORID.3 = ObjectIdentifier : 1.3.6.1.6.3.15.2.1.1 (snmpModules)
sysORID.4 = ObjectIdentifier : 1.3.6.1.6.3.1 (snmpMIB)
sysORID.5 = ObjectIdentifier : 1.3.6.1.6.3.16.2.2.1 (vacmBasicGroup)
sysORID.6 = ObjectIdentifier : 1.3.6.1.2.1.49 (tcpMIB)
sysORID.7 = ObjectIdentifier : 1.3.6.1.2.1.4 (ip)
sysORID.8 = ObjectIdentifier : 1.3.6.1.2.1.50 (udpMIB)
sysORID.9 = ObjectIdentifier : 1.3.6.1.6.3.13.3.1.3 (snmpModules)
sysORID.10 = ObjectIdentifier : 1.3.6.1.2.1.92 (mib-2)
sysORDescr.1 = DisplayString : The SNMP Management Architecture MIB.
sysORDescr.2 = DisplayString : The MIB for Message Processing and Dispatching.
sysORDescr.3 = DisplayString : The management information definitions for the SNMP User-based Security Model.
sysORDescr.4 = DisplayString : The MIB module for SNMPv2 entities
sysORDescr.5 = DisplayString : View-based Access Control Model for SNMP.
sysORDescr.6 = DisplayString : The MIB module for managing TCP implementations
sysORDescr.7 = DisplayString : The MIB module for managing IP and ICMP implementations
sysORDescr.8 = DisplayString : The MIB module for managing UDP implementations
sysORDescr.9 = DisplayString : The MIB modules for managing SNMP Notification, plus filtering.
sysORDescr.10 = DisplayString : The MIB module for logging SNMP Notifications.
sysORUpTime.1 = TimeStamp : 0
sysORUpTime.2 = TimeStamp : 0
sysORUpTime.3 = TimeStamp : 0
sysORUpTime.4 = TimeStamp : 0
sysORUpTime.5 = TimeStamp : 0
sysORUpTime.6 = TimeStamp : 0
sysORUpTime.7 = TimeStamp : 0
sysORUpTime.8 = TimeStamp : 0
sysORUpTime.9 = TimeStamp : 0
sysORUpTime.10 = TimeStamp : 0
#######################################################################
# EndTime: Mon Aug 3 02:01:06 PDT 2020
#######################################################################
+++ Results stored in snmpwalk-192172-16819-14-1192.txt
Use SCP to connect to the NetMRI appliance to obtain the file. You can also view the file from the Administrative Shell using the cat [snmpwalk-192172-16819-14-1192.txt]
command.
Anchor | ||||
---|---|---|---|---|
|
...