I have searched the documentation and fought with how to properly set up
net-snmp on the latest Uclibc Bering image.


FIRST. MY SETUP.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Name            Version        Description
===============-==============-=============================================
=
initrd          V2.0 uClibc-0. LEAF Bering initial filesystem

root            V2.0 uClibc-0. Core LEAF Bering package

config          0.1            config and backup system package

etc             V2.0 uClibc-0.

local           V2.0 uClibc-0. LEAF Bering local package

modules         V2.0 uClibc-0. Define & contain your LEAF Bering modules

iptables        1.2.8          IP packet filter administration tools for
2.4.
shorwall        1.4.5          Shoreline Firewall (Shorewall)

ulogd           1.00           The Netfilter Userspace Logging Daemon

dnscache        1.05a          A fast & secure proxy DNS server, patched for

dropbear        0.36           Dropbear is an SSH 2 server

libm                           The libm Library

libsnmp         5.0.9          SNMP libraries needed for snmp packages or
pac
netsnmpd        5.0.9          SNMP agent which binds to a port, awaits
reque
netstatn        1.4            $Id: README,v 1.8 2002/09/12 19:32:12 mardan
E
weblet          1.2.1-1        LEAF status via a small web server  


PID  Uid     VmSize Stat Command
    1 root        256 S   init [2]   
    2 root            SW  [keventd]
    3 root            SWN [ksoftirqd_CPU0]
    4 root            SW  [kswapd]
    5 root            SW  [bdflush]
    6 root            SW  [kupdated]
31724 root        280 S   /sbin/syslogd -m 240 
 2186 root        240 S   /sbin/klogd 
 8271 root        296 S   /usr/sbin/dropbear -p 22 -r
/etc/dropbear_rsa_host_ke
 8492 root        140 S   /usr/sbin/watchdog 
17517 root        280 S   /usr/sbin/inetd 
20557 root        276 S   /usr/sbin/ulogd -d 
 7137 root       1256 S   [dnscache]
26427 root       1584 S   /usr/sbin/snmpd 
19569 root        288 S   /usr/sbin/cron 
16864 root        268 S   /sbin/getty 38400 tty1 
18876 root        268 S   /sbin/getty 38400 tty2 
22101 root        448 S   /usr/sbin/dropbear -p 22 -r
/etc/dropbear_rsa_host_ke
21211 root        304 S   -sh 
13084 root        304 S   /bin/sh /usr/sbin/lrcfg 
 4237 root        324 S   /bin/sh /usr/sbin/lrcfg.conf    Packages
configuratio
  390 root        324 S   /bin/sh /usr/sbin/lrcfg.conf    Packages
configuratio
25365 root        320 S   /bin/sh /usr/sbin/lrcfg.conf    netsnmpd
configuratio
24674 root        292 S   /bin/sh /bin/edit /etc/snmp/snmpd.conf 
19576 root         40 S   /bin/e3ne /etc/snmp/snmpd.conf 
 7207 sh-httpd    332 S   /bin/sh /usr/sbin/sh-httpd 
21917 sh-httpd    304 S   /bin/sh /var/sh-www/cgi-bin/viewsys 
 4018 root        192 S   [sleep]
18074 root        240 S   [cat]
31058 sh-httpd    308 S   /bin/sh /var/sh-www/cgi-bin/viewsys 
  151 root        288 R   [ps]          

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

I am attempting to connect to my bering-Uclibc box with MRTG with the
following line: (See output)
C:\mrtg-2.10.0pre6\bin>perl cfgmaker [EMAIL PROTECTED] --global "WorkDir:
C:\
Inetpub\wwwroot\mrtg" --output My_firewall.cfg
--base: Get Device Info on [EMAIL PROTECTED]:
SNMP Error:
receiving response PDU: Unknown error
SNMPv1_Session (remote host: "192.168.1.254" [192.168.1.254].161)
                  community: "public"
                 request ID: 1981474209
                PDU bufsize: 8000 bytes
                    timeout: 2s
                    retries: 5
                    backoff: 1)
SNMPWALK Problem for 1.3.6.1.2.1.1 on [EMAIL PROTECTED]::::::v4only
WARNING: Skipping [EMAIL PROTECTED]: as no info could be retreived

--base: Writing My_firewall.cfg



I am thinking that the problems I am having are stemming from me not
assigning the community name properly.
What it comes down to is I am hoping someone could please show me a working
snmpd.conf file showing clearly where I need to go to change the community
name.
For Example, Say I wanted to have a community name of "Test1" for a
read-only community name and "Test2" for a read / write community name. 
It would be of great help to me if someone could paste in a sample config
that is using these two variables. I am sure that would make it allot
clearer for me. But please if you post keep in mind that I have never gone
through a snmp setup before and I need the "newbisized" instructions.

On a side note, I wish that the documentation [for net-snmp] would be made
not only for a seasoned OR intermediate user but also for the poor user who
is going to be trying something for the first time.  A useful way to
accomplish this is to display a working config and lay out detailed
instructions on how to connect to the snmp daemon with MRTG.


I would be happy to provide any additional info if it would be of any help.

Here is my snmp.conf file. (Thanks in advance!)

Troy

###########################################################################
#
# snmpd.conf
#
#   - created by the snmpconf configuration program
#
#   - /usr/share/snmp/snmpd.conf (Default)
#
#   <http://net-snmp.sourceforge.net/man/snmpd.conf.html>
#
###########################################################################
# SECTION: System Information Setup
#
#   This section defines some of the information reported in
#   the "system" mib group in the mibII tree.

# syscontact: The contact information for the administrator
#   arguments:  contact_string

syscontact  "Root <[EMAIL PROTECTED]>"

# syslocation: The [typically physical] location of the system.
#   arguments:  location_string

syslocation  "City, State Country"

# sysname: Do you need to hardcode the system name?
#   arguments:  system_name

sysname _CHANGE_MY_NAME_

# sysservices: The proper value for the sysServices object.
#   arguments:  sysservices_number

sysservices 15



###########################################################################
# SECTION: Access Control Setup
#
#   This section defines who is allowed to talk to your running
#   snmp agent.

#
----------------------------------------------------------------------------
-
# These create read-only & read-write communities that can be used to
# access the agent.  They are a quick method of using the following
# com2sec, group, access, and view directive lines.  They are not as
# efficient, as groups aren't created so the tables are possibly larger.
# In other words: don't use these if you have complex situations to set up.
#
----------------------------------------------------------------------------
-

# rouser: a SNMPv3 read-only user
#   arguments:  user [noauth|auth|priv] [restriction_oid]
#
 rouser  _ro_auth_user_    auth    system
 rouser  _ro_noauth_user_  noauth  system
 rouser  _ro_priv_user_    priv    all

# rwuser: a SNMPv3 read-write user
#   arguments:  user [noauth|auth|priv] [restriction_oid]
#
 rouser  _rw_auth_user_    auth    system
 rouser  _rw_noauth_user_  noauth  system
 rouser  _rw_priv_user_    priv    all

# rwcommunity: a SNMPv1/SNMPv2c read-write access community name
#   arguments:  community [default|hostname|network/bits] [oid]
#
 rouser  _rw_auth_user_    auth    system
 rouser  _rw_noauth_user_  noauth  system
 rouser  _rw_priv_user_    priv    all

# rwcommunity: a SNMPv1/SNMPv2c read-write access community name
#   arguments:  community [default|hostname|network/bits] [oid]
#
rwcommunity  _rw_Private_Community_Name_  192.168.1.26/24  system

# rocommunity: a SNMPv1/SNMPv2c read-only access community name
#   arguments:  community [default|hostname|network/bits] [oid]
#
rocommunity  _ro_Private_Community_Name_  192.168.1.26/24  all


#
----------------------------------------------------------------------------
-
# snmpd supports the View-Based Access Control Model (vacm) as defined
# in RFC 2275.  To this end, it recognizes the following keywords in the
# configuration file: com2sec, group, access, and view.  See:
#
<http://net-snmp.sourceforge.net/FAQ.html#How_do_I_configure_access_control_
>
#
----------------------------------------------------------------------------
-


####
# First, map the community name (COMMUNITY) into a security name
# (local and mynetwork, depending on where the request is coming
# from).  NOTE: First match wins!
#
#          sec.name   source   community
com2sec    paranoid   192.168.1.26/24  _ltd_Private_Community_Name_
com2sec    readonly   192.168.1.26/24  _ro_Private_Community_Name_
com2sec    readwrite  192.168.1.26/24  _rw_Private_Community_Name_


####
# Second, map the security names into group names:
#
#      groupName  sec.model  sec.name
group  RO_Group   usm        readonly
group  RO_Group   v1         readonly
group  RO_Group   v2c        readonly
group  RO_System  usm        paranoid
group  RO_System  v1         paranoid
group  RO_System  v2c        paranoid
group  RW_Group   usm        readwrite
group  RW_Group   v1         readwrite
group  RW_Group   v2c        readwrite


####
# Third, create a view for us to let the groups have rights to:
#
#     name    incl/excl  subtree                                  mask
(optional)
view  all     included   .1                                       80
view  system  included   .iso.org.dod.internet.mgmt.mib-2.system


####
# Finally, grant the 2 groups access to the 1 view with different
# write permissions:
#
#       group      context  sec.model  sec.level  match  read    write
notif
access  RO_System  ""       any        noauth     exact  system  none   none
access  RO_Group   ""       any        noauth     exact  all     none   none
access  RW_Group   ""       any        noauth     exact  all     all    none

#
----------------------------------------------------------------------------
-



###########################################################################
# SECTION: Trap Destinations
#
#   Here we define who the agent will send traps to.

# authtrapenable: Should we send traps when authentication failures occur
#   arguments: 1 | 2   (1 = yes, 2 = no)

authtrapenable  1

# informsink: A SNMPv2c inform (acknowledged trap) receiver
#   arguments: host [community] [portnum]

informsink  _Special_SNMP_Manager_  _Private_Community_Name_

# trapcommunity: Default trap sink community to use
#   arguments: community-string

trapcommunity  _Private_Community_Name_

# trapsink: A SNMPv1 trap receiver
#   arguments: host [community] [portnum]

trapsink  _Special_SNMP_Manager_  _Private_Community_Name_

# trap2sink: A SNMPv2c trap receiver
#   arguments: host [community] [portnum]

trap2sink  _Special_SNMP_Manager_  _Private_Community_Name_



###########################################################################
# SECTION: Monitor Various Aspects of the Running Host
#
#   The following check up on various aspects of a host.

# file: Check on the size of a file.
#   Display a files size statistics.
#   If it grows to be too large, report an error about it.
#
#    file /path/to/file [maxsize_in_bytes]
#
#      if maxsize is not specified, assume only size reporting is needed.
#
#   The results are reported in the fileTable section of the UCD-SNMP-MIB
tree

file  /var/log/kern.log 5000000

# load: Check for unreasonable load average values.
#   Watch the load average levels on the machine.
#
#    load [1MAX=12.0] [5MAX=12.0] [15MAX=12.0]
#
#    1MAX:   If the 1 minute load average is above this limit at query
#            time, the errorFlag will be set.
#    5MAX:   Similar, but for 5 min average.
#    15MAX:  Similar, but for 15 min average.
#
#   The results are reported in the laTable section of the UCD-SNMP-MIB tree

load  12 10 8

# disk: Check for disk space usage of a partition.
#   The agent can check the amount of available disk space, and make
#   sure it is above a set limit.
#
#    disk PATH [MIN=100000]
#
#    PATH:  mount path to the disk in question.
#    MIN:   Disks with space below this value will have the Mib's errorFlag
set.
#           Can be a raw byte value or a percentage followed by the %
#           symbol.  Default value = 100000.
#
#   The results are reported in the dskTable section of the UCD-SNMP-MIB
tree

disk  / 10%

# proc: Check for processes that should be running.
#     proc NAME [MAX=0] [MIN=0]
#
#     NAME:  the name of the process to check for.  It must match
#            exactly (ie, http will not find httpd processes).
#     MAX:   the maximum number allowed to be running.  Defaults to 0.
#     MIN:   the minimum number to be running.  Defaults to 0.
#
#   The results are reported in the prTable section of the UCD-SNMP-MIB tree
#   Special Case:  When the min and max numbers are both 0, it assumes
#   you want a max of infinity and a min of 1.

proc  syslogd 1 1








-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to