Document toolboxDocument toolbox

snmpwalk command

Obtain a tree of information from a network device using automatic SNMP GETNEXT commands. In NetMRI’s administrative shell version of the snmpwalk command, you can specify the SNMP version, the community string, and the desired Root Object ID (OID).

For SNMP v3, you can additionally specify the encryption protocol from the following:

  • aes-128
  • aes-192
  • aes-192C (for Cisco devices only)
  • aes-256
  • aes-256C (for Cisco devices only)
  • des
  • 3des

Syntax

The following is the command syntax:

snmpwalk

Example

The command prompts for further information before executing. If only one network view exists in the NetMRI appliance, you will not be prompted to enter that value.

The output is similar to the following:

SA4-17> snmpwalk

Enter SNMP hostname or IP address []: 172.19.4.192

Enter Network View []: MGMT

Enter SNMP version (1, 2c, 3) [2c]: 3

Enter SNMP Username ]: aes_username

SNMP Authentication [no]: yes

Enter SNMP Authentication Passphrase ]: my_passwd

Enter SNMP Authentication Protocol [MD5]: sha

SNMP Privacy [no]: yes

Enter SNMP Privacy Passphrase ]: my_aes_passwd

Enter SNMP Privacy Protocol [DES]: aes-256

Enter Root OID to start walk [system]:

Use legacy snmpwalk tool [n]:

+++ Executing snmpwalk ...

#######################################################################

# Generated by NetMRI Administrator SNMP Walk

# SerialNo : 4850201904810449

# SNMP Host: 172.19.4.192

# SNMP Root: system

# StartTime: Mon Aug302:01:06 PDT 2020

#######################################################################


sysDescr.0 = DisplayString : Linux stsitou-deb10 4.19.0-8-amd64 #1 SMP Debian 4.19.98-1 (2020-01-26) x86_64

sysObjectID.0 = ObjectIdentifier : 1.3.6.1.4.1.8072.3.2.10 (Net-SNMP Net-SNMP)

sysUpTime.0 = TimeTicks : 40923950

sysContact.0 = DisplayString : Me <me@example.org>

sysName.0 = DisplayString : stsitou-deb10

sysLocation.0 = DisplayString : Sitting on the Dock of the Bay

sysServices.0 = Integer32 : 4

sysORLastChange.0 = TimeStamp : 0

sysORID.1 = ObjectIdentifier : 1.3.6.1.6.3.10.3.1.1 (snmpFrameworkMIBCompliance)

sysORID.2 = ObjectIdentifier : 1.3.6.1.6.3.11.3.1.1 (snmpModules)

sysORID.3 = ObjectIdentifier : 1.3.6.1.6.3.15.2.1.1 (snmpModules)

sysORID.4 = ObjectIdentifier : 1.3.6.1.6.3.1 (snmpMIB)

sysORID.5 = ObjectIdentifier : 1.3.6.1.6.3.16.2.2.1 (vacmBasicGroup)

sysORID.6 = ObjectIdentifier : 1.3.6.1.2.1.49 (tcpMIB)

sysORID.7 = ObjectIdentifier : 1.3.6.1.2.1.4 (ip)

sysORID.8 = ObjectIdentifier : 1.3.6.1.2.1.50 (udpMIB)

sysORID.9 = ObjectIdentifier : 1.3.6.1.6.3.13.3.1.3 (snmpModules)

sysORID.10 = ObjectIdentifier : 1.3.6.1.2.1.92 (mib-2)

sysORDescr.1 = DisplayString : The SNMP Management Architecture MIB.

sysORDescr.2 = DisplayString : The MIB for Message Processing and Dispatching.

sysORDescr.3 = DisplayString : The management information definitions for the SNMP User-based Security Model.

sysORDescr.4 = DisplayString : The MIB module for SNMPv2 entities

sysORDescr.5 = DisplayString : View-based Access Control Model for SNMP.

sysORDescr.6 = DisplayString : The MIB module for managing TCP implementations

sysORDescr.7 = DisplayString : The MIB module for managing IP and ICMP implementations

sysORDescr.8 = DisplayString : The MIB module for managing UDP implementations

sysORDescr.9 = DisplayString : The MIB modules for managing SNMP Notification, plus filtering.

sysORDescr.10 = DisplayString : The MIB module for logging SNMP Notifications.

sysORUpTime.1 = TimeStamp : 0

sysORUpTime.2 = TimeStamp : 0

sysORUpTime.3 = TimeStamp : 0

sysORUpTime.4 = TimeStamp : 0

sysORUpTime.5 = TimeStamp : 0

sysORUpTime.6 = TimeStamp : 0

sysORUpTime.7 = TimeStamp : 0

sysORUpTime.8 = TimeStamp : 0

sysORUpTime.9 = TimeStamp : 0

sysORUpTime.10 = TimeStamp : 0


#######################################################################

# EndTime: Mon Aug 3 02:01:06 PDT 2020

#######################################################################


+++ Results stored in snmpwalk-172-19-4-192.txt

Use SCP to connect to the NetMRI appliance to obtain the file. You can also view the file from the administrative shell using the cat [snmpwalk-172-19-4-192.txt] command.