SNMP configuration examples
Devices
Cisco
Adaptive Security Appliance (ASA)
ASDM
- Launch ASDM and connect to your device
- Go to Configuration > Management Access > SNMP
- Add your community string
- Add in the "SNMP Host Access List" section your LibreNMS server IP address
- Click Apply and Save
CLI
# SNMPv2c
snmp-server community <YOUR-COMMUNITY>
snmp-server contact <YOUR-CONTACT>
snmp-server location <YOUR-LOCATION>
snmp-server host <INTERFACE> <LIBRENMS-IP> poll community <YOUR-COMMUNITY> version 2c
# SNMPv3
snmp-server group <GROUP-NAME> v3 priv
snmp-server user <USER-NAME> <GROUP-NAME> v3 auth sha <AUTH-PASSWORD> priv aes 128 <PRIV-PASSWORD>
snmp-server contact <YOUR-CONTACT>
snmp-server location <YOUR-LOCATION>
snmp-server host <INTERFACE> <LIBRENMS-IP> poll version 3 <USER-NAME>
Note: If the device is unable to find the SNMP user, reboot the ASA. Once rebooted, continue the steps as normal.
IOS / IOS XE
# SNMPv2c
snmp-server community <YOUR-COMMUNITY> RO
snmp-server contact <YOUR-CONTACT>
snmp-server location <YOUR-LOCATION>
# SNMPv3
snmp-server group <GROUP-NAME> v3 priv
snmp-server user <USER-NAME> <GROUP-NAME> v3 auth sha <AUTH-PASSWORD> priv aes 128 <PRIV-PASSWORD>
snmp-server contact <YOUR-CONTACT>
snmp-server location <YOUR-LOCATION>
# Note: The following is also required if using SNMPv3 and you want to populate the FDB table, STP info and others.
snmp-server group <GROUP-NAME> v3 priv context vlan- match prefix
Note: If the device is unable to find the SNMP user, reboot the ASA. Once rebooted, continue the steps as normal.
NX-OS
# SNMPv2c
snmp-server community <YOUR-COMMUNITY> RO
snmp-server contact <YOUR-CONTACT>
snmp-server location <YOUR-LOCATION>
# SNMPv3
snmp-server user <USER-NAME> <GROUP-NAME> v3 auth sha <AUTH-PASSWORD> priv aes 128 <PRIV-PASSWORD>
snmp-server contact <YOUR-CONTACT>
snmp-server location <YOUR-LOCATION>
Wireless LAN Controller (WLC)
- Access the web admin page and log in
- If you are running version 8.1 and later, on the new dashboard click "Advanced"
- Go to management Tab
- On SNMP sub-menu, select "Communities"
- Click "New..."
- Add your community name and leave IP addresses empty
- Click Apply and Save
Eaton
Network Card-MS
- Connect to the Web UI of the device
- Upgrade to the latest available manufacturer firmware which applies to your hardware revision. Refer to the release notes. For devices which can use the Lx releases, do install LD.
- After rebooting the card (safe for connected load), configure Network, System and Access Control. Save config for each step.
- Configure SNMP. The device defaults to both SNMP v1 and v3 enabled, with default credentials. Disable what you do not need. SNMP v3 works, but uses MD5/DES. You may have to add another section to your SNMP credentials table in LibreNMS. Save.
HPE / 3PAR
Comware
SNMPv2c
snmp-agent community read <YOUR-COMMUNITY>
snmp-agent sys-info contact <YOUR-CONTACT>
snmp-agent sys-info location <YOUR-LOCATION>
snmp-agent sys-info version all
snmp-agent packet max-size 6000
packet max-size
is required for some walks to complete, but the path must support fragmentation.
SNMPv3
snmp-agent mib-view excluded ExcludeAll snmp
snmp-agent group v3 V3ROGroup privacy read-view ViewDefault write-view ExcludeAll
snmp-agent usm-user v3 <USER> V3ROGroup simple authentication-mode sha <AuthKey> privacy-mode aes128 <PrivacyKey>
snmp-agent sys-info contact <YOUR-CONTACT>
snmp-agent sys-info location <YOUR-LOCATION>
snmp-agent sys-info version v3
undo snmp-agent sys-info version v1 v2c
snmp-agent packet max-size 6000
packet max-size
is required for some walks to complete, but the path must support fragmentation.
Inform OS 3.2.x
- Access the CLI
- Add an SNMP Manager with your LibreNMS IP address:
addsnmpmgr <librenms ip>
- Add your SNMP community:
setsnmppw <community>
Infoblox
NIOS 7.x+
- Access the web admin page and log in
- Go to Grid tab > Grid Manager
- In the right menu select "Grid properties"
- Select "SNMP" menu
- Click "Enable SNMPv1/SNMPv2 Queries"
- Add your community
- Click Save & Close
Juniper
Junos OS
for SNMPv1/v2c
set snmp description description
set snmp location location
set snmp contact contact
set snmp community YOUR-COMMUNITY authorization read-only
for SNMPv3 (authPriv):
set snmp v3 usm local-engine user authpriv authentication-sha authentication-password YOUR_AUTH_SECRET
set snmp v3 usm local-engine user authpriv privacy-aes128 privacy-password YOUR_PRIV_SECRET
set snmp v3 vacm security-to-group security-model usm security-name authpriv group mysnmpv3
set snmp v3 vacm access group mysnmpv3 default-context-prefix security-model any security-level authentication read-view mysnmpv3view
set snmp v3 vacm access group mysnmpv3 default-context-prefix security-model any security-level privacy read-view mysnmpv3view
set snmp view mysnmpv3view oid iso include
Mikrotik
RouterOS 6.x
CLI SNMP v2 Configuration
/snmp community
set [ find default=yes ] read-access=no
add addresses=<ALLOWED-SRC-IPs/NETMASK> name=<COMMUNITY>
/snmp
set contact="<NAME>" enabled=yes engine-id=<ENGINE ID> location="<LOCALTION>"
- About the snmp community commands:
- The commands change the default snmp community. It is probably possible to create a new one instead.
specify the address and host (not network) netmask of the LibreNMS server. Example: 192.168.8.71/32 - trap-version=2 must also be specified if some other trap-version has been set
- trap-interfaces may also be used to limit the interfaces the router listens on
- About the snmp command:
- contact, engine-id and location are optional
- trap-community is probably required if a new snmp community has been created.
CLI SNMP v3 Configuration for authPriv
/snmp community
add name="<COMMUNITY>" addresses="<ALLOWED-SRC-IPs/NETMASK>"
set "<COMMUNITY>" authentication-password="<AUTH_PASS>" authentication-protocol=MD5
set "<COMMUNITY>" encryption-password="<ENCRYP_PASS>" encryption-protocol=AES
set "<COMMUNITY>" read-access=yes write-access=no security=private
#Disable public SNMP
set public read-access=no write-access=no security=private
/snmp
set contact="<NAME>" enabled=yes engine-id="<ENGINE ID>" location="<LOCALTION>"
- Use password with length of min 8 chars
Notes for both SNMP v2 and v3
- In some cases of advanced routing one may need to set explicitly the source IP address from which the SNMP daemon will reply -
/snmp set src-address=<SELF_IP_ADDRESS>
Palo Alto
PANOS 6.x/7.x
- Access the web admin page and log in
- Go to Device tab > Setup
- Go to the sub-tab "Operations"
- Click "SNMP Setup"
- Enter your SNMP community and then click "OK"
- Click Apply
Note that you need to allow SNMP on the needed interfaces. To do that you need to create a network "Interface Mgmt" profile for standard interface and allow SNMP under "Device > Management > Management Interface Settings" for out of band management interface.
One may also configure SNMP from the command line, which is useful when you need to configure more than one firewall for SNMP monitoring. Log into the firewall(s) via ssh, and perform these commands for basic SNMPv3 configuration:
username@devicename> configure
username@devicename# set deviceconfig system service disable-snmp no
username@devicename# set deviceconfig system snmp-setting access-setting version v3 views pa view iso oid 1.3.6.1
username@devicename# set deviceconfig system snmp-setting access-setting version v3 views pa view iso option include
username@devicename# set deviceconfig system snmp-setting access-setting version v3 views pa view iso mask 0xf0
username@devicename# set deviceconfig system snmp-setting access-setting version v3 users authpriv authpwd YOUR_AUTH_SECRET
username@devicename# set deviceconfig system snmp-setting access-setting version v3 users authpriv privpwd YOUR_PRIV_SECRET
username@devicename# set deviceconfig system snmp-setting access-setting version v3 users authpriv view pa
username@devicename# set deviceconfig system snmp-setting snmp-system location "Yourcity, Yourcountry [60.4,5.31]"
username@devicename# set deviceconfig system snmp-setting snmp-system contact [email protected]
username@devicename# commit
username@devicename# exit
Ubiquiti
EdgeOs
If you use the HTTP interface: 1. Access the legacy web admin page and log in 1. Go to System > Advanced Configuration 1. Go to the sub-tab "SNMP" > "Community" 1. Click "Add Community Group" 1. Enter your SNMP community, ip address and click submit 1. Go to System > Summary 1. Go to the sub-tab "Description" 1. Enter your System Name, System Location and System Contact. 1. Click submit 1. Click "Save Configuration"
If you use CLI:
username@devicename> enable
username@devicename# configure
username@devicename (Config)# snmp-server community "public" ro
username@devicename (Config)# snmp-server sysname "devicename"
username@devicename (Config)# snmp-server contact "[email protected]"
username@devicename (Config)# exit
username@devicename# write memory
VMware
ESX/ESXi 5.x/6.x
Log on to your ESX server by means of ssh. You may have to enable the ssh service in the GUI first. From the CLI, execute the following commands:
esxcli system snmp set --authentication SHA1
esxcli system snmp set --privacy AES128
esxcli system snmp hash --auth-hash YOUR_AUTH_SECRET --priv-hash YOUR_PRIV_SECRET --raw-secret
This command produces output like this
Authhash: f3d8982fc28e8d1346c26eee49eb2c4a5950c934
Privhash: 0596ab30b315576a4e9f7d7bde65bf49b749e335
Now define a SNMPv3 user:
esxcli system snmp set --users <username>/f3d8982fc28e8d1346c26eee49eb2c4a5950c934/0596ab30b315576a4e9f7d7bde65bf49b749e335/priv
esxcli system snmp set -L "Yourcity, Yourcountry [60.4,5.3]"
esxcli system snmp set -C [email protected]
esxcli system snmp set --enable true
Note: In case of snmp timeouts, disable the firewall with
esxcli network firewall set --enabled false
If snmp timeouts still occur with firewall disabled, migrate VMs if needed and reboot ESXi host.
VCenter 6.x
Log on to your ESX server by means of ssh. You may have to enable the ssh service in the GUI first. From the CLI, execute the following commands:
snmp.set --authentication SHA1
snmp.set --privacy AES128
snmp.hash --auth_hash YOUR_AUTH_SECRET --priv_hash YOUR_PRIV_SECRET --raw_secret true
This command produces output like this
Privhash: 0596ab30b315576a4e9f7d7bde65bf49b749e335
Authhash: f3d8982fc28e8d1346c26eee49eb2c4a5950c934
Now define a SNMPv3 user:
snmp.set --users authpriv/f3d8982fc28e8d1346c26eee49eb2c4a5950c934/0596ab30b315576a4e9f7d7bde65bf49b749e335/priv
snmp.enable
Operating systems
Linux (snmpd v2)
Replace your snmpd.conf file by the example below and edit it with appropriate community in "RANDOMSTRINGGOESHERE".
vi /etc/snmp/snmpd.conf
# Change RANDOMSTRINGGOESHERE to your preferred SNMP community string
com2sec readonly default RANDOMSTRINGGOESHERE
group MyROGroup v2c readonly
view all included .1 80
access MyROGroup "" any noauth exact all none none
syslocation Rack, Room, Building, City, Country [GPSX,Y]
syscontact Your Name <[email protected]>
#Distro Detection
extend distro /usr/bin/distro
#Hardware Detection (uncomment to enable)
#extend hardware '/bin/cat /sys/devices/virtual/dmi/id/product_name'
#extend manufacturer '/bin/cat /sys/devices/virtual/dmi/id/sys_vendor'
#extend serial '/bin/cat /sys/devices/virtual/dmi/id/product_serial'
NOTE: On some systems the snmpd is running as its own user, which means it can't read /sys/devices/virtual/dmi/id/product_serial
which is mode 0400. One solution is to include @reboot chmod 444 /sys/devices/virtual/dmi/id/product_serial
in the crontab for root or equivalent.
Non-x86 or SMBIOS-based systems, such as ARM-based Raspberry Pi units should query device tree locations for this metadata, for example:
extend hardware '/bin/cat /sys/firmware/devicetree/base/model'
extend serial '/bin/cat /sys/firmware/devicetree/base/serial-number'
The LibreNMS server include a copy of this example here:
/opt/librenms/snmpd.conf.example
The binary /usr/bin/distro must be copied from the original source repository:
curl -o /usr/bin/distro https://raw.githubusercontent.com/librenms/librenms-agent/master/snmp/distro
chmod +x /usr/bin/distro
Linux (snmpd v3)
Go to /etc/snmp/snmpd.conf
Open the file in vi or nano /etc/snmp/snmpd.conf and add the following line to create SNMPV3 User (replace username and passwords with your own):
createUser authPrivUser SHA "authPassword" AES "privPassword"
Make sure the agent listens to all interfaces by adding the following line inside snmpd.conf:
agentAddress udp:161,udp6:161
This line simply means listen to connections across all interfaces IPv4 and IPv6 respectively
Uncomment and change the following line to give read access to the username created above (rouser is what LibreNMS uses) :
#rouser authPrivUser priv
Change the following details inside snmpd.conf
syslocation Rack, Room, Building, City, Country [GPSX,Y]
syscontact Your Name <[email protected]>
Save and exit the file
Restart the snmpd service
CentOS 6 / Red hat 6
service snmpd restart
CentOS 7 / Red hat 7
systemctl restart snmpd
Add SNMP to Firewalld
firewall-cmd --zone=public --permanent --add-service=snmp
firewall-cmd --reload
Ubuntu
service snmpd restart
Arch Linux (snmpd v2)
- Install SNMP Package
pacman -S net-snmp
- create SNMP folder
mkdir /etc/snmp/
- set community
echo rocommunity read_only_community_string >> /etc/snmp/snmpd.conf
- set contact
echo syscontact Firstname Lastname >> /etc/snmp/snmpd.conf
- set location
echo syslocation L69 4RX >> /etc/snmp/snmpd.conf
- enable startup
systemctl enable snmpd.service
- start snmp
systemctl restart snmpd.service
Windows Server 2008 R2
- Log in to your Windows Server 2008 R2
- Start "Server Manager" under "Administrative Tools"
- Click "Features" and then click "Add Feature"
- Check (if not checked) "SNMP Service", click "Next" until "Install"
- Start "Services" under "Administrative Tools"
- Edit "SNMP Service" properties
- Go to the security tab
- In "Accepted community name" click "Add" to add your community string and permission
- In "Accept SNMP packets from these hosts" click "Add" and add your LibreNMS server IP address
- Validate change by clicking "Apply"
Windows Server 2012 R2 and newer
GUI
- Log in to your Windows Server 2012 R2 or newer
- Start "Server Manager" under "Administrative Tools"
- Click "Manage" and then "Add Roles and Features"
- Continue by pressing "Next" to the "Features" menu
- Install (if not installed) "SNMP Service"
- Start "Services" under "Administrative Tools"
- Edit "SNMP Service" properties
- Go to the security tab
- In "Accepted community name" click "Add" to add your community string and permission
- In "Accept SNMP packets from these hosts" click "Add" and add your LibreNMS server IP address
- Validate change by clicking "Apply"
PowerShell
The following example will install SNMP, set the Librenms IP and set a read only community string.
Replace $IP
and $communitystring
with your values.
Install-WindowsFeature -Name 'SNMP-Service','RSAT-SNMP'
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\services\SNMP\Parameters\PermittedManagers" -Name 2 -Value $IP
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\services\SNMP\Parameters\ValidCommunities" -Name $communitystring -Value 4
Note: SNMPv3 can be supported on Windows platforms with the use of Net-SNMP.
Mac OSX
Step 1: sudo nano /etc/snmp/snmpd.conf
#Allow read-access with the following SNMP Community String:
rocommunity public
# all other settings are optional but recommended.
# Location of the device
syslocation data centre A
# Human Contact for the device
syscontact SysAdmin
# System Name of the device
sysName SystemName
# the system OID for this device. This is optional but recommended,
# to identify this as a MAC OS system.
sysobjectid 1.3.6.1.4.1.8072.3.2.16
Step 2:
sudo launchctl load -w /System/Library/LaunchDaemons/org.net-snmp.snmpd.plist