Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In addition to the browser-based interface accessible via HTTP (port 80) and HTTPS (port 443), NetMRI supports a command line interface accessible via SSH (port In addition to the browser-based interface accessible via HTTP (port 80) and HTTPS (port 443), NetMRI supports a command line interface accessible via SSH (port 22). The Administrative Shell accepts a variety of commands that are useful for troubleshooting and maintenance.

...

Anchor
halt command
halt command
halt command

Use this command to shut down NetMRI, then shut down the server, and then power off.

Anchor
InstallHelpFiles command
InstallHelpFiles command
Anchor
bookmark867
bookmark867
installhelpfiles command

...

Note

The NetMRI NT-1400 appliance is licensed as standalone even if the OC license is applied. For information about the NetMRI NT-1400 appliance, see Operations Center Appliances and Requirements.


Note

For the Customer Name field, use only US-ASCII symbols.

Example 1 Sample output when you continue to use an existing license

...

The command prompts for further information before executing (if only one network view exists in the NetMRI appliance, you will not be prompted to enter that value):

SA4-17> snmpwalk

Enter SNMP hostname or IP address []: 172.19.4.192

Enter Network View []: MGMT

Enter SNMP version (1, 2c, 3) [2c]: 3

Enter SNMP Username ]: aes_username

SNMP Authentication [no]: yes

Enter SNMP Authentication Passphrase ]: my_passwd

Enter SNMP Authentication Protocol [MD5]: sha

SNMP Privacy [no]: yes

Enter SNMP Privacy Passphrase ]: my_aes_passwd

Enter SNMP Privacy Protocol [DES]: aes-256

Enter Root OID to start walk [system]:

Use legacy snmpwalk tool [n]:

+++ Executing snmpwalk ...

#######################################################################

# Generated by NetMRI Administrator SNMP Walk

...

# StartTime: Mon Aug302:01:06 PDT 2020

#######################################################################


sysDescr.0 = DisplayString : Linux stsitou-deb10 4.19.0-8-amd64 #1 SMP Debian 4.19.98-1 (2020-01-26) x86_64

sysObjectID.0 = ObjectIdentifier : 1.3.6.1.4.1.8072.3.2.10 (Net-SNMP Net-SNMP

sysUpTime.0 = TimeTicks : 40923950

sysContact.0 = DisplayString : Me <me@example.org>

sysName.0 = DisplayString : stsitou-deb10

sysLocation.0 = DisplayString : Sitting on the Dock of the Bay

NetManager_West> snmpwalk 192.168.1.1

Enter Network View: West-Lab

Enter SNMP hostname or IP address []: 192.168.1.1

Enter SNMP version [2c]: 3

Enter SNMP Username []: user_name

SNMP Authentication [no]: yes

Enter SNMP Authentication Passphrase: auth_pwd

Enter SNMP Authentication Protocol [MD5]: SHA

SNMP Privacy [no]: yes

Enter SNMP Privacy Passphrase []: privacy_pwd

Enter SNMP Privacy Protocol [DES]: aes-256

Enter Root OID to start walk [system]: 1.3

Use legacy snmpwalk tool [n]:

+++ Executing snmpwalk ...

#######################################################################

# Generated by NetMRI Administrator SNMP Walk

# SerialNo : VM-C64E-FA34C

# SNMP Host: 192.168.1.1

# SNMP Root: 1.3

# StartTime: Mon Jul 20 15:02:16 EDT 2020

#######################################################################

2020-07-20 15:02:33 [warn] snmpwalk: No response from remote host '192.168.1.1'

#######################################################################

# EndTime: Mon Jul 20 15:02:33 EDT sysServices.0 = Integer32 : 4

sysORLastChange.0 = TimeStamp : 0

sysORID.1 = ObjectIdentifier : 1.3.6.1.6.3.10.3.1.1 (snmpFrameworkMIBCompliance)

sysORID.2 = ObjectIdentifier : 1.3.6.1.6.3.11.3.1.1 (snmpModules)

sysORID.3 = ObjectIdentifier : 1.3.6.1.6.3.15.2.1.1 (snmpModules)

sysORID.4 = ObjectIdentifier : 1.3.6.1.6.3.1 (snmpMIB)

sysORID.5 = ObjectIdentifier : 1.3.6.1.6.3.16.2.2.1 (vacmBasicGroup)

sysORID.6 = ObjectIdentifier : 1.3.6.1.2.1.49 (tcpMIB)

sysORID.7 = ObjectIdentifier : 1.3.6.1.2.1.4 (ip)

sysORID.8 = ObjectIdentifier : 1.3.6.1.2.1.50 (udpMIB)

sysORID.9 = ObjectIdentifier : 1.3.6.1.6.3.13.3.1.3 (snmpModules)

sysORID.10 = ObjectIdentifier : 1.3.6.1.2.1.92 (mib-2)


sysORDescr.1 = DisplayString : The SNMP Management Architecture MIB.

sysORDescr.2 = DisplayString : The MIB for Message Processing and Dispatching.

sysORDescr.3 = DisplayString : The management information definitions for the SNMP User-based Security Model.

sysORDescr.4 = DisplayString : The MIB module for SNMPv2 entities

sysORDescr.5 = DisplayString : View-based Access Control Model for SNMP.

sysORDescr.6 = DisplayString : The MIB module for managing TCP implementations

sysORDescr.7 = DisplayString : The MIB module for managing IP and ICMP implementations

sysORDescr.8 = DisplayString : The MIB module for managing UDP implementations

sysORDescr.9 = DisplayString : The MIB modules for managing SNMP Notification, plus filtering.

sysORDescr.10 = DisplayString : The MIB module for logging SNMP Notifications.

sysORUpTime.1 = TimeStamp : 0

sysORUpTime.2 = TimeStamp : 0

sysORUpTime.3 = TimeStamp : 0

sysORUpTime.4 = TimeStamp : 0

sysORUpTime.5 = TimeStamp : 0

sysORUpTime.6 = TimeStamp : 0

sysORUpTime.7 = TimeStamp : 0

sysORUpTime.8 = TimeStamp : 0

sysORUpTime.9 = TimeStamp : 0

sysORUpTime.10 = TimeStamp : 0


#######################################################################

# EndTime: Mon Aug 3 02:01:06 PDT 2020

#######################################################################


+++ Results stored in snmpwalk-192172-16819-14-1192.txt


Use SCP to connect to the NetMRI appliance to obtain the file. You can also view the file from the Administrative Shell using the cat [snmpwalk-192172-16819-14-1192.txt] command.

Anchor
SSHkeyCommands
SSHkeyCommands
ssh-key commands

...