I have searched the documentation and fought with how to properly set up
net-snmp on the latest Uclibc Bering image.
FIRST. MY SETUP.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Name Version Description
===============-==============-=============================================
=
initrd V2.0 uClibc-0. LEAF Bering initial filesystem
root V2.0 uClibc-0. Core LEAF Bering package
config 0.1 config and backup system package
etc V2.0 uClibc-0.
local V2.0 uClibc-0. LEAF Bering local package
modules V2.0 uClibc-0. Define & contain your LEAF Bering modules
iptables 1.2.8 IP packet filter administration tools for
2.4.
shorwall 1.4.5 Shoreline Firewall (Shorewall)
ulogd 1.00 The Netfilter Userspace Logging Daemon
dnscache 1.05a A fast & secure proxy DNS server, patched for
dropbear 0.36 Dropbear is an SSH 2 server
libm The libm Library
libsnmp 5.0.9 SNMP libraries needed for snmp packages or
pac
netsnmpd 5.0.9 SNMP agent which binds to a port, awaits
reque
netstatn 1.4 $Id: README,v 1.8 2002/09/12 19:32:12 mardan
E
weblet 1.2.1-1 LEAF status via a small web server
PID Uid VmSize Stat Command
1 root 256 S init [2]
2 root SW [keventd]
3 root SWN [ksoftirqd_CPU0]
4 root SW [kswapd]
5 root SW [bdflush]
6 root SW [kupdated]
31724 root 280 S /sbin/syslogd -m 240
2186 root 240 S /sbin/klogd
8271 root 296 S /usr/sbin/dropbear -p 22 -r
/etc/dropbear_rsa_host_ke
8492 root 140 S /usr/sbin/watchdog
17517 root 280 S /usr/sbin/inetd
20557 root 276 S /usr/sbin/ulogd -d
7137 root 1256 S [dnscache]
26427 root 1584 S /usr/sbin/snmpd
19569 root 288 S /usr/sbin/cron
16864 root 268 S /sbin/getty 38400 tty1
18876 root 268 S /sbin/getty 38400 tty2
22101 root 448 S /usr/sbin/dropbear -p 22 -r
/etc/dropbear_rsa_host_ke
21211 root 304 S -sh
13084 root 304 S /bin/sh /usr/sbin/lrcfg
4237 root 324 S /bin/sh /usr/sbin/lrcfg.conf Packages
configuratio
390 root 324 S /bin/sh /usr/sbin/lrcfg.conf Packages
configuratio
25365 root 320 S /bin/sh /usr/sbin/lrcfg.conf netsnmpd
configuratio
24674 root 292 S /bin/sh /bin/edit /etc/snmp/snmpd.conf
19576 root 40 S /bin/e3ne /etc/snmp/snmpd.conf
7207 sh-httpd 332 S /bin/sh /usr/sbin/sh-httpd
21917 sh-httpd 304 S /bin/sh /var/sh-www/cgi-bin/viewsys
4018 root 192 S [sleep]
18074 root 240 S [cat]
31058 sh-httpd 308 S /bin/sh /var/sh-www/cgi-bin/viewsys
151 root 288 R [ps]
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
I am attempting to connect to my bering-Uclibc box with MRTG with the
following line: (See output)
C:\mrtg-2.10.0pre6\bin>perl cfgmaker [EMAIL PROTECTED] --global "WorkDir:
C:\
Inetpub\wwwroot\mrtg" --output My_firewall.cfg
--base: Get Device Info on [EMAIL PROTECTED]:
SNMP Error:
receiving response PDU: Unknown error
SNMPv1_Session (remote host: "192.168.1.254" [192.168.1.254].161)
community: "public"
request ID: 1981474209
PDU bufsize: 8000 bytes
timeout: 2s
retries: 5
backoff: 1)
SNMPWALK Problem for 1.3.6.1.2.1.1 on [EMAIL PROTECTED]::::::v4only
WARNING: Skipping [EMAIL PROTECTED]: as no info could be retreived
--base: Writing My_firewall.cfg
I am thinking that the problems I am having are stemming from me not
assigning the community name properly.
What it comes down to is I am hoping someone could please show me a working
snmpd.conf file showing clearly where I need to go to change the community
name.
For Example, Say I wanted to have a community name of "Test1" for a
read-only community name and "Test2" for a read / write community name.
It would be of great help to me if someone could paste in a sample config
that is using these two variables. I am sure that would make it allot
clearer for me. But please if you post keep in mind that I have never gone
through a snmp setup before and I need the "newbisized" instructions.
On a side note, I wish that the documentation [for net-snmp] would be made
not only for a seasoned OR intermediate user but also for the poor user who
is going to be trying something for the first time. A useful way to
accomplish this is to display a working config and lay out detailed
instructions on how to connect to the snmp daemon with MRTG.
I would be happy to provide any additional info if it would be of any help.
Here is my snmp.conf file. (Thanks in advance!)
Troy
###########################################################################
#
# snmpd.conf
#
# - created by the snmpconf configuration program
#
# - /usr/share/snmp/snmpd.conf (Default)
#
# <http://net-snmp.sourceforge.net/man/snmpd.conf.html>
#
###########################################################################
# SECTION: System Information Setup
#
# This section defines some of the information reported in
# the "system" mib group in the mibII tree.
# syscontact: The contact information for the administrator
# arguments: contact_string
syscontact "Root <[EMAIL PROTECTED]>"
# syslocation: The [typically physical] location of the system.
# arguments: location_string
syslocation "City, State Country"
# sysname: Do you need to hardcode the system name?
# arguments: system_name
sysname _CHANGE_MY_NAME_
# sysservices: The proper value for the sysServices object.
# arguments: sysservices_number
sysservices 15
###########################################################################
# SECTION: Access Control Setup
#
# This section defines who is allowed to talk to your running
# snmp agent.
#
----------------------------------------------------------------------------
-
# These create read-only & read-write communities that can be used to
# access the agent. They are a quick method of using the following
# com2sec, group, access, and view directive lines. They are not as
# efficient, as groups aren't created so the tables are possibly larger.
# In other words: don't use these if you have complex situations to set up.
#
----------------------------------------------------------------------------
-
# rouser: a SNMPv3 read-only user
# arguments: user [noauth|auth|priv] [restriction_oid]
#
rouser _ro_auth_user_ auth system
rouser _ro_noauth_user_ noauth system
rouser _ro_priv_user_ priv all
# rwuser: a SNMPv3 read-write user
# arguments: user [noauth|auth|priv] [restriction_oid]
#
rouser _rw_auth_user_ auth system
rouser _rw_noauth_user_ noauth system
rouser _rw_priv_user_ priv all
# rwcommunity: a SNMPv1/SNMPv2c read-write access community name
# arguments: community [default|hostname|network/bits] [oid]
#
rouser _rw_auth_user_ auth system
rouser _rw_noauth_user_ noauth system
rouser _rw_priv_user_ priv all
# rwcommunity: a SNMPv1/SNMPv2c read-write access community name
# arguments: community [default|hostname|network/bits] [oid]
#
rwcommunity _rw_Private_Community_Name_ 192.168.1.26/24 system
# rocommunity: a SNMPv1/SNMPv2c read-only access community name
# arguments: community [default|hostname|network/bits] [oid]
#
rocommunity _ro_Private_Community_Name_ 192.168.1.26/24 all
#
----------------------------------------------------------------------------
-
# snmpd supports the View-Based Access Control Model (vacm) as defined
# in RFC 2275. To this end, it recognizes the following keywords in the
# configuration file: com2sec, group, access, and view. See:
#
<http://net-snmp.sourceforge.net/FAQ.html#How_do_I_configure_access_control_
>
#
----------------------------------------------------------------------------
-
####
# First, map the community name (COMMUNITY) into a security name
# (local and mynetwork, depending on where the request is coming
# from). NOTE: First match wins!
#
# sec.name source community
com2sec paranoid 192.168.1.26/24 _ltd_Private_Community_Name_
com2sec readonly 192.168.1.26/24 _ro_Private_Community_Name_
com2sec readwrite 192.168.1.26/24 _rw_Private_Community_Name_
####
# Second, map the security names into group names:
#
# groupName sec.model sec.name
group RO_Group usm readonly
group RO_Group v1 readonly
group RO_Group v2c readonly
group RO_System usm paranoid
group RO_System v1 paranoid
group RO_System v2c paranoid
group RW_Group usm readwrite
group RW_Group v1 readwrite
group RW_Group v2c readwrite
####
# Third, create a view for us to let the groups have rights to:
#
# name incl/excl subtree mask
(optional)
view all included .1 80
view system included .iso.org.dod.internet.mgmt.mib-2.system
####
# Finally, grant the 2 groups access to the 1 view with different
# write permissions:
#
# group context sec.model sec.level match read write
notif
access RO_System "" any noauth exact system none none
access RO_Group "" any noauth exact all none none
access RW_Group "" any noauth exact all all none
#
----------------------------------------------------------------------------
-
###########################################################################
# SECTION: Trap Destinations
#
# Here we define who the agent will send traps to.
# authtrapenable: Should we send traps when authentication failures occur
# arguments: 1 | 2 (1 = yes, 2 = no)
authtrapenable 1
# informsink: A SNMPv2c inform (acknowledged trap) receiver
# arguments: host [community] [portnum]
informsink _Special_SNMP_Manager_ _Private_Community_Name_
# trapcommunity: Default trap sink community to use
# arguments: community-string
trapcommunity _Private_Community_Name_
# trapsink: A SNMPv1 trap receiver
# arguments: host [community] [portnum]
trapsink _Special_SNMP_Manager_ _Private_Community_Name_
# trap2sink: A SNMPv2c trap receiver
# arguments: host [community] [portnum]
trap2sink _Special_SNMP_Manager_ _Private_Community_Name_
###########################################################################
# SECTION: Monitor Various Aspects of the Running Host
#
# The following check up on various aspects of a host.
# file: Check on the size of a file.
# Display a files size statistics.
# If it grows to be too large, report an error about it.
#
# file /path/to/file [maxsize_in_bytes]
#
# if maxsize is not specified, assume only size reporting is needed.
#
# The results are reported in the fileTable section of the UCD-SNMP-MIB
tree
file /var/log/kern.log 5000000
# load: Check for unreasonable load average values.
# Watch the load average levels on the machine.
#
# load [1MAX=12.0] [5MAX=12.0] [15MAX=12.0]
#
# 1MAX: If the 1 minute load average is above this limit at query
# time, the errorFlag will be set.
# 5MAX: Similar, but for 5 min average.
# 15MAX: Similar, but for 15 min average.
#
# The results are reported in the laTable section of the UCD-SNMP-MIB tree
load 12 10 8
# disk: Check for disk space usage of a partition.
# The agent can check the amount of available disk space, and make
# sure it is above a set limit.
#
# disk PATH [MIN=100000]
#
# PATH: mount path to the disk in question.
# MIN: Disks with space below this value will have the Mib's errorFlag
set.
# Can be a raw byte value or a percentage followed by the %
# symbol. Default value = 100000.
#
# The results are reported in the dskTable section of the UCD-SNMP-MIB
tree
disk / 10%
# proc: Check for processes that should be running.
# proc NAME [MAX=0] [MIN=0]
#
# NAME: the name of the process to check for. It must match
# exactly (ie, http will not find httpd processes).
# MAX: the maximum number allowed to be running. Defaults to 0.
# MIN: the minimum number to be running. Defaults to 0.
#
# The results are reported in the prTable section of the UCD-SNMP-MIB tree
# Special Case: When the min and max numbers are both 0, it assumes
# you want a max of infinity and a min of 1.
proc syslogd 1 1
-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html