Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Obtain a tree of information from a network device using automatic SNMP GETNEXT commands. In NetMRI’s administrative shell version of the snmpwalk command, you can specify the SNMP version, the community string, and the desired Root Object ID (OID).

For SNMP v3, you can additionally specify the encryption protocol from the following:

  • aes-128
  • aes-192
  • aes-192C (for Cisco devices only)
  • aes-256
  • aes-256C (for Cisco devices only)
  • des
  • 3des

Syntax

The following is the command syntax:

snmpwalk 22

Example

The command prompts for further information before executing (if only one network view exists in the NetMRI appliance, you will not be prompted to enter that value):

SA4-17> snmpwalk

Enter SNMP hostname or IP address []: 172.19.4.192

Enter Network View []: MGMT

Enter SNMP version (1, 2c, 3) [2c]: 3

Enter SNMP Username ]: aes_username

SNMP Authentication [no]: yes

Enter SNMP Authentication Passphrase ]: my_passwd

Enter SNMP Authentication Protocol [MD5]: sha

SNMP Privacy [no]: yes

Enter SNMP Privacy Passphrase ]: my_aes_passwd

Enter SNMP Privacy Protocol [DES]: aes-256

Enter Root OID to start walk [system]:

Use legacy snmpwalk tool [n]:

+++ Executing snmpwalk ...

#######################################################################

# Generated by NetMRI Administrator SNMP Walk

# SerialNo : 4850201904810449

# SNMP Host: 172.19.4.192

# SNMP Root: system

# StartTime: Mon Aug302:01:06 PDT 2020

#######################################################################


sysDescr.0 = DisplayString : Linux stsitou-deb10 4.19.0-8-amd64 #1 SMP Debian 4.19.98-1 (2020-01-26) x86_64

sysObjectID.0 = ObjectIdentifier : 1.3.6.1.4.1.8072.3.2.10 (Net-SNMP Net-SNMP)

sysUpTime.0 = TimeTicks : 40923950

sysContact.0 = DisplayString : Me <me@example.org>

sysName.0 = DisplayString : stsitou-deb10

sysLocation.0 = DisplayString : Sitting on the Dock of the Bay

sysServices.0 = Integer32 : 4

sysORLastChange.0 = TimeStamp : 0

sysORID.1 = ObjectIdentifier : 1.3.6.1.6.3.10.3.1.1 (snmpFrameworkMIBCompliance)

sysORID.2 = ObjectIdentifier : 1.3.6.1.6.3.11.3.1.1 (snmpModules)

sysORID.3 = ObjectIdentifier : 1.3.6.1.6.3.15.2.1.1 (snmpModules)

sysORID.4 = ObjectIdentifier : 1.3.6.1.6.3.1 (snmpMIB)

sysORID.5 = ObjectIdentifier : 1.3.6.1.6.3.16.2.2.1 (vacmBasicGroup)

sysORID.6 = ObjectIdentifier : 1.3.6.1.2.1.49 (tcpMIB)

sysORID.7 = ObjectIdentifier : 1.3.6.1.2.1.4 (ip)

sysORID.8 = ObjectIdentifier : 1.3.6.1.2.1.50 (udpMIB)

sysORID.9 = ObjectIdentifier : 1.3.6.1.6.3.13.3.1.3 (snmpModules)

sysORID.10 = ObjectIdentifier : 1.3.6.1.2.1.92 (mib-2)

sysORDescr.1 = DisplayString : The SNMP Management Architecture MIB.

sysORDescr.2 = DisplayString : The MIB for Message Processing and Dispatching.

sysORDescr.3 = DisplayString : The management information definitions for the SNMP User-based Security Model.

sysORDescr.4 = DisplayString : The MIB module for SNMPv2 entities

sysORDescr.5 = DisplayString : View-based Access Control Model for SNMP.

sysORDescr.6 = DisplayString : The MIB module for managing TCP implementations

sysORDescr.7 = DisplayString : The MIB module for managing IP and ICMP implementations

sysORDescr.8 = DisplayString : The MIB module for managing UDP implementations

sysORDescr.9 = DisplayString : The MIB modules for managing SNMP Notification, plus filtering.

sysORDescr.10 = DisplayString : The MIB module for logging SNMP Notifications.

sysORUpTime.1 = TimeStamp : 0

sysORUpTime.2 = TimeStamp : 0

sysORUpTime.3 = TimeStamp : 0

sysORUpTime.4 = TimeStamp : 0

sysORUpTime.5 = TimeStamp : 0

sysORUpTime.6 = TimeStamp : 0

sysORUpTime.7 = TimeStamp : 0

sysORUpTime.8 = TimeStamp : 0

sysORUpTime.9 = TimeStamp : 0

sysORUpTime.10 = TimeStamp : 0


#######################################################################

# EndTime: Mon Aug 3 02:01:06 PDT 2020

#######################################################################


+++ Results stored in snmpwalk-172-19-4-192.txt

Use SCP to connect to the NetMRI appliance to obtain the file. You can also view the file from the administrative shell using the cat [snmpwalk-172-19-4-192.txt] command.

  • No labels